Remote Code Execution Flaw in EMC Data Protection Advisor by Dell EMC
CVE-2017-10955
8.8HIGH
Summary
This vulnerability permits remote attackers to execute arbitrary code on installations of EMC Data Protection Advisor version 6.3.0. Authenticating users are at risk due to a flaw in the EMC DPA Application service, which listens on TCP port 9002 by default. The flaw arises from improper validation of the preScript parameter, allowing an attacker to exploit it to execute system calls. As a result, the attacker can gain arbitrary code execution with SYSTEM privileges. Dell EMC has stated its position that this does not constitute a vulnerability.
Affected Version(s)
Dell EMC Data Protection Advisor 6.3.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved