FKIE_CVE-2022-45103
Vulnerability from fkie_nvd - Published: 2023-01-18 15:15 - Updated: 2024-11-21 07:28
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Dell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 9.2.3.x contain an information disclosure vulnerability. A low privileged remote attacker could potentially exploit this vulnerability, leading to read arbitrary files on the underlying file system.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dell:emc_solutions_enabler_virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8387C0A6-5B08-4ED3-94C9-3F6A0D2FD663",
"versionEndExcluding": "9.2.3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:emc_unisphere_for_powermax:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90943C0A-23EE-4FF4-82FE-B095B4F7F647",
"versionEndExcluding": "9.2.3.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:emc_unisphere_for_powermax:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBCE9AB3-9796-4F15-AC46-6209E85C98BF",
"versionEndExcluding": "10.0.0.5",
"versionStartIncluding": "10.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:emc_unisphere_for_powermax_virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D79BF436-665F-4D1E-963C-1EE7C87CC1E5",
"versionEndExcluding": "9.2.3.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:emc_vasa_provider_virtual_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2B03A15-20F8-4A9D-8EE5-873B0A85ED1E",
"versionEndExcluding": "9.2.4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:solutions_enabler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27D9AEC0-7614-4E79-BAF7-36939780DA12",
"versionEndExcluding": "9.2.3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:solutions_enabler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34ECB10B-FB47-4B2D-8629-DCAD9D46E630",
"versionEndExcluding": "10.0.0.5",
"versionStartIncluding": "10.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:unisphere_360:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD8C2F65-AFDA-4B55-ABE6-CFDBA027F66A",
"versionEndExcluding": "9.2.3.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:vasa_provider:*:*:*:*:standalone:*:*:*",
"matchCriteriaId": "CDC05F62-AC66-4CC2-85DA-E7DFCE645FDF",
"versionEndExcluding": "9.2.4.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:dell:powermax_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053A6C03-0833-4F96-9D5F-466A5B9DB84B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:dell:powermax_os:5978:*:*:*:*:*:*:*",
"matchCriteriaId": "43696C46-48E8-43E4-9387-77CE1B2BD401",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nDell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 9.2.3.x contain an information disclosure vulnerability. A low privileged remote attacker could potentially exploit this vulnerability, leading to read arbitrary files on the underlying file system.\n\n\n\n\n\n"
},
{
"lang": "es",
"value": "Las versiones 9.2.3.x de Dell Unisphere para PowerMax vApp, VASA Provider vApp y Solution Enabler vApp versi\u00f3n 9.2.3.x contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a leer archivos arbitrarios en el sistema de archivos subyacente."
}
],
"id": "CVE-2022-45103",
"lastModified": "2024-11-21T07:28:47.307",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-01-18T15:15:11.313",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000207177/dsa-2022-340-dell-unisphere-for-powermax-dell-unisphere-for-powermax-vapp-dell-solutions-enabler-vapp-dell-unisphere-360-dell-vasa-provider-vapp-and-dell-powermax-emb-mgmt-security-update-for-multiple-vulnerabilities"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000207177/dsa-2022-340-dell-unisphere-for-powermax-dell-unisphere-for-powermax-vapp-dell-solutions-enabler-vapp-dell-unisphere-360-dell-vasa-provider-vapp-and-dell-powermax-emb-mgmt-security-update-for-multiple-vulnerabilities"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…