- Description
- Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
- Source
- security_alert@emc.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- security_alert@emc.com
- CWE-321
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dell:powerpath_management_appliance:2.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "52816B9C-22F2-441E-91F1-5259597B74A5"
},
{
"criteria": "cpe:2.3:a:dell:powerpath_management_appliance:3.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1FEE04FA-1675-4981-ABBC-6B897F262D66"
},
{
"criteria": "cpe:2.3:a:dell:powerpath_management_appliance:3.0:patch_01:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "365876FA-46CC-4AD7-BD47-DC81526B543F"
},
{
"criteria": "cpe:2.3:a:dell:powerpath_management_appliance:3.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FC22B1B0-E9A4-44F7-BAA3-7F3F592448FE"
},
{
"criteria": "cpe:2.3:a:dell:powerpath_management_appliance:3.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D92273A9-3C81-4082-9550-DC1497AEDF39"
}
],
"operator": "OR"
}
]
}
]