Vulnerability Details : CVE-2018-1206
Dell EMC Data Protection Advisor versions prior to 6.3 Patch 159 and Dell EMC Data Protection Advisor versions prior to 6.4 Patch 110 contain a hardcoded database account with administrative privileges. The affected account is "apollosuperuser." An attacker with local access to the server where DPA Datastore Service is installed and knowledge of the password may potentially gain unauthorized access to the database. Note: The Datastore Service database cannot be accessed remotely using this account.
Vulnerability category: Bypass
Products affected by CVE-2018-1206
- cpe:2.3:a:emc:data_protection_advisor:6.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:emc:data_protection_advisor:6.4.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-1206
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-1206
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2018-1206
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-1206
-
http://seclists.org/fulldisclosure/2018/Mar/22
Full Disclosure: DSA-2018-020: Dell EMC Data Protection Advisor Hardcoded Password VulnerabilityMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1040484
EMC Data Protection Advisor Hardcoded Password Lets Local Users Gain Administrative Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/103376
EMC Data Protection Advisor Local Hardcoded Credentials Information Disclosure VulnerabilityVDB Entry;Third Party Advisory
Jump to