CVE-2021-36298

Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity.
References
Link Resource
https://www.dell.com/support/kbdoc/000191604 Patch Vendor Advisory
https://www.dell.com/support/kbdoc/000191604 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dell:isilon_insightiq_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dell:isilon_insightiq:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () https://www.dell.com/support/kbdoc/000191604 - Patch, Vendor Advisory () https://www.dell.com/support/kbdoc/000191604 - Patch, Vendor Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 8.1

Information

Published : 2021-10-01 21:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36298

Mitre link : CVE-2021-36298

CVE.ORG link : CVE-2021-36298


JSON object : View

Products Affected

dell

  • isilon_insightiq_firmware
  • isilon_insightiq
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm