CVE-2018-1216

A hard-coded password vulnerability was discovered in vApp Manager which is embedded in Dell EMC Unisphere for VMAX, Dell EMC Solutions Enabler, Dell EMC VASA Virtual Appliances, and Dell EMC VMAX Embedded Management (eManagement): Dell EMC Unisphere for VMAX Virtual Appliance versions prior to 8.4.0.18, Dell EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.21, Dell EMC VASA Virtual Appliance versions prior to 8.4.0.514, and Dell EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier). They contain an undocumented default account (smc) with a hard-coded password that may be used with certain web servlets. A remote attacker with the knowledge of the hard-coded password and the message format may use vulnerable servlets to gain unauthorized access to the system. Note: This account cannot be used to log in via the web user interface.
References
Link Resource
http://seclists.org/fulldisclosure/2018/Feb/41 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/103039 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040383 Third Party Advisory VDB Entry
https://www.tenable.com/security/research/tra-2018-03 Third Party Advisory
http://seclists.org/fulldisclosure/2018/Feb/41 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/103039 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040383 Third Party Advisory VDB Entry
https://www.tenable.com/security/research/tra-2018-03 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dell:emc_solutions_enabler_virtual_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_unisphere_for_vmax_virtual_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_vasa_virtual_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_vmax_embedded_management:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2018/Feb/41 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Feb/41 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/103039 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103039 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040383 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040383 - Third Party Advisory, VDB Entry
References () https://www.tenable.com/security/research/tra-2018-03 - Third Party Advisory () https://www.tenable.com/security/research/tra-2018-03 - Third Party Advisory

Information

Published : 2018-03-08 15:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1216

Mitre link : CVE-2018-1216

CVE.ORG link : CVE-2018-1216


JSON object : View

Products Affected

dell

  • emc_vasa_virtual_appliance
  • emc_unisphere_for_vmax_virtual_appliance
  • emc_vmax_embedded_management
  • emc_solutions_enabler_virtual_appliance
CWE
CWE-798

Use of Hard-coded Credentials