Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity.
References
Link | Resource |
---|---|
https://www.dell.com/support/kbdoc/000191604 | Patch Vendor Advisory |
https://www.dell.com/support/kbdoc/000191604 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.dell.com/support/kbdoc/000191604 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 8.1 |
Information
Published : 2021-10-01 21:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36298
Mitre link : CVE-2021-36298
CVE.ORG link : CVE-2021-36298
JSON object : View
Products Affected
dell
- isilon_insightiq_firmware
- isilon_insightiq
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm