SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Device (Embedded Server/Appliance)  >   EMC RecoverPoint Vendors:   EMC
EMC RecoverPoint Command Injection Bugs Let Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1040320
SecurityTracker URL:  http://securitytracker.com/id/1040320
CVE Reference:   CVE-2018-1184, CVE-2018-1185   (Links to External Site)
Date:  Feb 2 2018
Impact:   Execution of arbitrary code via network, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Two vulnerabilities were reported in EMC RecoverPoint. A local user can obtain root privileges on the target system.

A local user with 'admin' privileges can supply specially crafted data via the Admin command line interface (CLI) to escape from the restricted shell to an interactive shell and run arbitrary commands with root privileges [CVE-2018-1185].

A local user with 'boxmgmt' privileges can supply specially crafted data via the Boxmgmt command line interface (CLI) to run arbitrary commands with root privileges [CVE-2018-1184].

Janjua, Mike Erman, Jack Backer, and Alexander Gonzalez from Northrop Grumman reported these vulnerabilities.

Impact:   A local user can execute arbitrary commands with root privileges on the target system.
Solution:   The vendor has issued a fix (RecoverPoint 5.0.1.3, 5.1.0.1; RecoverPoint for Virtual Machines 5.0.1.3, 5.1.1; Advisory ESA-2018-015).
Vendor URL:  www.emc.com/ (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC