CVE-2017-4984

In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, an unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system, aka remote code execution.
References
Link Resource
http://www.securityfocus.com/archive/1/540738/30/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/99039 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:emc:vnx2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:emc:vnx2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:emc:vnx1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:emc:vnx1:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-06-19 12:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-4984

Mitre link : CVE-2017-4984

CVE.ORG link : CVE-2017-4984


JSON object : View

Products Affected

emc

  • vnx1
  • vnx1_firmware
  • vnx2_firmware
  • vnx2
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')