var-201810-0110
Vulnerability from variot
Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains an Information Exposure vulnerability. The log file contents store sensitive data including executed commands to generate authentication tokens which may prove useful to an attacker for crafting malicious authentication tokens for querying the application and subsequent attacks. Dell EMC ESRS virtual edition is prone to the following multiple security vulnerabilities. 1. An insecure file permission vulnerability 2. A plaintext password storage vulnerability 3. A information disclosure vulnerability Successfully exploiting this issue can allow an attacker to obtain sensitive information , to bypass certain security restrictions to perform unauthorized actions and use the sensitive data available that may aid in launching further attacks. This software is used to provide remote connection between EMC customer service and user's EMC products and solutions. An attacker could exploit this vulnerability to obtain information.
Details: 1. The application contains multiple configuration files with world-readable permissions that could allow an authenticated malicious user to utilize the file contents to potentially elevate their privileges. CVSSv3 Base Score: 7.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H)
-
Database credentials are stored in plaintext in a configuration file. An authenticated malicious user with access to the configuration file may obtain the exposed password to gain access to the application database. CVSSv3 Base Score: 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
Dell Product Security Incident Response Team secure@dell.comsecure@dell.com
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEP5nobPoCj3pTvhAZgSlofD2Yi6cFAlvEhxEACgkQgSlofD2Y i6dKYQ//cRY70VtXrzbeCc/8y3ManHY8OoDga3nxgLHqs1NuBoCME4Fe1KGUPg1R j4Wxi5IXo/ZAjPxmzTZgXfs2i3KdhVFt/mYyV2qGjn2ciH6XKkEa/8MUMeEWC4p+ 6/OIdleuxie/vXH+K772gTfM477E6nKFV9G79/SKulFD+i6bkHqxmtU22aj5/V+t Cd895DDQngNMtx853euh9OuP4xMw/neEeNmcu+WSVtfoDCB0XEWPp/upExCre/2/ ThFU1bx8PP15FhzeQNzzMZHpVLPB0qG3sbFwCVsMxnpgF8PqTEaRSudi9WTZVdWw c7hKhO3nzlPYNE+br6T02d8z0CjuDc3NVW4FPt7gfKO1bkBVEvq/4MwwesBARhV1 4FUiQ1YaxC/GHTkjBhNQcy+2KpohMZEprwPY7nT2S75YLXhGs50vAPDbnzhZ+dmk EJgp4DGxwDM1sPx8HVwvqrc6R5lk+ZaULEKSmBei2bXYbcXLEEjIZYtPbEcjMHfs Uz7aRkOaG/G+Z104mkPH1mtQpnotOu0icfyOOiRtRrJW/7dcUVOdK7DqbAUwW7mA o/UwkcVJmUfz0f5Wdjv/vSBu2KgHP7QymXU57e3Lp8TOaSwK9405KVJhpXXLutPf cUQEyqIwlBw8WU5o8rm6kNWBGRfKpFF6DjU4q+9D0TSrN28N/Kk= =vLNR -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0110", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emc secure remote services", "scope": "lt", "trust": 1.0, "vendor": "dell", "version": "3.32.00.08" }, { "model": "secure remote services", "scope": "lt", "trust": 0.8, "vendor": "dell emc old emc", "version": "3.32.00.08" }, { "model": "esrs virtual edition", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "3.28" }, { "model": "esrs virtual edition", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "3.24" }, { "model": "esrs virtual edition", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "3.10" }, { "model": "esrs virtual edition", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "3.08" }, { "model": "esrs virtual edition", "scope": "ne", "trust": 0.3, "vendor": "dell", "version": "3.32.00.08" } ], "sources": [ { "db": "BID", "id": "105694" }, { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "NVD", "id": "CVE-2018-15765" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:emc:secure_remote_services", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-012387" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell", "sources": [ { "db": "BID", "id": "105694" } ], "trust": 0.3 }, "cve": "CVE-2018-15765", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-15765", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-126057", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-15765", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "security_alert@emc.com", "availabilityImpact": "NONE", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 0.8, "id": "CVE-2018-15765", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-15765", "trust": 1.0, "value": "MEDIUM" }, { "author": "security_alert@emc.com", "id": "CVE-2018-15765", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2018-15765", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201810-1053", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-126057", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-126057" }, { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "CNNVD", "id": "CNNVD-201810-1053" }, { "db": "NVD", "id": "CVE-2018-15765" }, { "db": "NVD", "id": "CVE-2018-15765" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains an Information Exposure vulnerability. The log file contents store sensitive data including executed commands to generate authentication tokens which may prove useful to an attacker for crafting malicious authentication tokens for querying the application and subsequent attacks. Dell EMC ESRS virtual edition is prone to the following multiple security vulnerabilities. \n1. An insecure file permission vulnerability\n2. A plaintext password storage vulnerability\n3. A information disclosure vulnerability\nSuccessfully exploiting this issue can allow an attacker to obtain sensitive information , to bypass certain security restrictions to perform unauthorized actions and use the sensitive data available that may aid in launching further attacks. This software is used to provide remote connection between EMC customer service and user\u0027s EMC products and solutions. An attacker could exploit this vulnerability to obtain information. \n\nDetails:\n1. The application contains multiple configuration files with world-readable permissions that could allow an authenticated malicious user to utilize the file contents to potentially elevate their privileges. \nCVSSv3 Base Score: 7.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H)\n\n2. Database credentials are stored in plaintext in a configuration file. An authenticated malicious user with access to the configuration file may obtain the exposed password to gain access to the application database. \nCVSSv3 Base Score: 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\n3. \n\nSeverity Rating\nFor an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\nLegal Information\nRead and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). The information set forth herein is provided \"as is\" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus\n iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. \n\nDell Product Security Incident Response Team\nsecure@dell.com\u003cmailto:secure@dell.com\u003e\n\n-----BEGIN PGP SIGNATURE-----\n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\ncUQEyqIwlBw8WU5o8rm6kNWBGRfKpFF6DjU4q+9D0TSrN28N/Kk=\n=vLNR\n-----END PGP SIGNATURE-----\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2018-15765" }, { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "BID", "id": "105694" }, { "db": "VULHUB", "id": "VHN-126057" }, { "db": "PACKETSTORM", "id": "149840" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-15765", "trust": 2.9 }, { "db": "BID", "id": "105694", "trust": 2.0 }, { "db": "SECTRACK", "id": "1041877", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-012387", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201810-1053", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-126057", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149840", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-126057" }, { "db": "BID", "id": "105694" }, { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "PACKETSTORM", "id": "149840" }, { "db": "CNNVD", "id": "CNNVD-201810-1053" }, { "db": "NVD", "id": "CVE-2018-15765" } ] }, "id": "VAR-201810-0110", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-126057" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:48:33.521000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.dellemc.com/en-us/index.htm" }, { "title": "Dell EMC Secure Remote Services Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86202" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "CNNVD", "id": "CNNVD-201810-1053" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-126057" }, { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "NVD", "id": "CVE-2018-15765" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://seclists.org/fulldisclosure/2018/oct/35" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/105694" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1041877" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15765" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15765" }, { "trust": 0.3, "url": "http://dell.com" }, { "trust": 0.1, "url": "https://support.emc.com/servicecenter/contactemc/)." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11080" }, { "trust": 0.1, "url": "https://support.emc.com/kb/468307)." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11079" } ], "sources": [ { "db": "VULHUB", "id": "VHN-126057" }, { "db": "BID", "id": "105694" }, { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "PACKETSTORM", "id": "149840" }, { "db": "CNNVD", "id": "CNNVD-201810-1053" }, { "db": "NVD", "id": "CVE-2018-15765" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-126057" }, { "db": "BID", "id": "105694" }, { "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "db": "PACKETSTORM", "id": "149840" }, { "db": "CNNVD", "id": "CNNVD-201810-1053" }, { "db": "NVD", "id": "CVE-2018-15765" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-126057" }, { "date": "2018-10-15T00:00:00", "db": "BID", "id": "105694" }, { "date": "2019-02-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "date": "2018-10-17T15:51:32", "db": "PACKETSTORM", "id": "149840" }, { "date": "2018-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1053" }, { "date": "2018-10-18T22:29:00.630000", "db": "NVD", "id": "CVE-2018-15765" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-126057" }, { "date": "2018-10-15T00:00:00", "db": "BID", "id": "105694" }, { "date": "2019-02-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-012387" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1053" }, { "date": "2024-11-21T03:51:25.700000", "db": "NVD", "id": "CVE-2018-15765" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1053" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell EMC Secure Remote Services Vulnerable to information disclosure", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-012387" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1053" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.