SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   EMC Unisphere Vendors:   EMC
Dell EMC Unisphere VMAX Default Account Lets Remote Users Access the System and Web Server Flaw Lets Remote Authenticated Users Upload Arbitrary Files
SecurityTracker Alert ID:  1040383
SecurityTracker URL:  http://securitytracker.com/id/1040383
CVE Reference:   CVE-2018-1215, CVE-2018-1216   (Links to External Site)
Date:  Feb 14 2018
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 8.4.0.18
Description:   Two vulnerabilities were reported in Dell EMC Unisphere VMAX. A remote authenticated user can upload files to the target system. A remote user can gain access to the target system.

The VMAX Virtual Appliance (vApp) contains an undocumented default account ('smc') with a hard-coded password [CVE-2018-1216]. A remote user can invoke certain servlets using the password to gain access to the target system.

The password cannot be used via the web user interface.

A remote authenticated user can upload arbitrary files to arbitrary locations on the target system [CVE-2018-1215].

Carlos Perez from Tenable reported these vulnerabilities.

Impact:   A remote authenticated user can upload arbitrary files to arbitrary locations on the target system.

A remote user can gain access to the target system.

Solution:   The vendor has issued a fix (8.4.0.18 OVA hotfix 1090, service alert 1059; 8.4.0.18 ISO upgrade hotfix 1089, service alert 1058; Advisory DSA-2018-024).

[Editor's note: The vendor reports that new installations no longer include the default 'smc' account. The vendor also reports that upgraded installations do not and cannot remove the default 'smc' account but remove all the servlets that use the account, thereby mitigating the vulnerability.]

Vendor URL:  www.dell.com/ (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC