var-201907-0245
Vulnerability from variot
Dell EMC Unity and UnityVSA versions prior to 5.0.0.0.5.116 contain an improper authorization vulnerability in NAS Server quotas configuration. A remote authenticated Unisphere Operator could potentially exploit this vulnerability to edit quota configuration of other users. Dell EMC Unity and UnityVSA Contains an authorization vulnerability.Information may be tampered with. An attacker may leverage these issues to bypass certain security restrictions and obtain sensitive information; this may aid in launching further attacks. UnityVSA is a virtual Unity storage environment. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0245", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emc unity operating environment", "scope": "lt", "trust": 1.8, "vendor": "dell", "version": "5.0.0.0.5.116" }, { "model": "emc unityvsa operating environment", "scope": "lt", "trust": 1.8, "vendor": "dell", "version": "5.0.0.0.5.116" }, { "model": "emc unityvsa operating environment", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "0" }, { "model": "emc unity operating environment", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "0" }, { "model": "emc unityvsa operating environment", "scope": "ne", "trust": 0.3, "vendor": "dell", "version": "5.0.0.0.5.116" }, { "model": "emc unity operating environment", "scope": "ne", "trust": 0.3, "vendor": "dell", "version": "5.0.0.0.5.116" } ], "sources": [ { "db": "BID", "id": "109309" }, { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "NVD", "id": "CVE-2019-3734" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:dell:emc_unity_operating_environment", "vulnerable": true }, { "cpe22Uri": "cpe:/a:dell:emc_unityvsa_operating_environment", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006738" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "109309" } ], "trust": 0.3 }, "cve": "CVE-2019-3734", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2019-3734", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-155169", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2019-3734", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "security_alert@emc.com", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2019-3734", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-3734", "trust": 1.0, "value": "MEDIUM" }, { "author": "security_alert@emc.com", "id": "CVE-2019-3734", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-3734", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201907-1078", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-155169", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-155169" }, { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "CNNVD", "id": "CNNVD-201907-1078" }, { "db": "NVD", "id": "CVE-2019-3734" }, { "db": "NVD", "id": "CVE-2019-3734" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell EMC Unity and UnityVSA versions prior to 5.0.0.0.5.116 contain an improper authorization vulnerability in NAS Server quotas configuration. A remote authenticated Unisphere Operator could potentially exploit this vulnerability to edit quota configuration of other users. Dell EMC Unity and UnityVSA Contains an authorization vulnerability.Information may be tampered with. \nAn attacker may leverage these issues to bypass certain security restrictions and obtain sensitive information; this may aid in launching further attacks. UnityVSA is a virtual Unity storage environment. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products", "sources": [ { "db": "NVD", "id": "CVE-2019-3734" }, { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "BID", "id": "109309" }, { "db": "VULHUB", "id": "VHN-155169" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3734", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2019-006738", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201907-1078", "trust": 0.7 }, { "db": "BID", "id": "109309", "trust": 0.3 }, { "db": "CNVD", "id": "CNVD-2020-15721", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-155169", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155169" }, { "db": "BID", "id": "109309" }, { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "CNNVD", "id": "CNNVD-201907-1078" }, { "db": "NVD", "id": "CVE-2019-3734" } ] }, "id": "VAR-201907-0245", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-155169" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:59:50.466000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "An Introduction to Unity Software | Dell EMC US", "trust": 0.8, "url": "https://www.dellemc.com/en-us/documentation/unity-family/unity-p-software-upgrades/01-unity-upg-br-introduction.htm" }, { "title": "Dell EMC UnityVSA", "trust": 0.8, "url": "https://www.dellemc.com/en-us/products-solutions/trial-software-download/unity-vsa.htm" }, { "title": "Dell EMC Unity and UnityVSA Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95093" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "CNNVD", "id": "CNNVD-201907-1078" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-285", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155169" }, { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "NVD", "id": "CVE-2019-3734" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://productsecurity-ux.ausmp1z1.pcf.dell.com/support/security/us/en/04/details/535028/dsa-2019-086-dell-emc-unity-family-multiple-vulnerabilities" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3734" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3734" }, { "trust": 0.3, "url": "http://dell.com" }, { "trust": 0.3, "url": "https://www.dell.com/support/security/us/en/19/details/535028/dsa-2019-086-dell-emc-unity-family-multiple-vulnerabilities" } ], "sources": [ { "db": "VULHUB", "id": "VHN-155169" }, { "db": "BID", "id": "109309" }, { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "CNNVD", "id": "CNNVD-201907-1078" }, { "db": "NVD", "id": "CVE-2019-3734" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-155169" }, { "db": "BID", "id": "109309" }, { "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "db": "CNNVD", "id": "CNNVD-201907-1078" }, { "db": "NVD", "id": "CVE-2019-3734" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-18T00:00:00", "db": "VULHUB", "id": "VHN-155169" }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "109309" }, { "date": "2019-07-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "date": "2019-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-1078" }, { "date": "2019-07-18T16:15:12.390000", "db": "NVD", "id": "CVE-2019-3734" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-155169" }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "109309" }, { "date": "2019-07-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006738" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-1078" }, { "date": "2024-11-21T04:42:25.807000", "db": "NVD", "id": "CVE-2019-3734" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-1078" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell EMC Unity and UnityVSA Authorization vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006738" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-1078" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…