Vulnerability Details : CVE-2022-31234
Dell EMC PowerStore, contain(s) an Improper Restriction of Excessive Authentication Attempts Vulnerability in PowerStore Manager GUI. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to password brute-forcing. Account takeover is possible if weak passwords are used by users.
Products affected by CVE-2022-31234
- cpe:2.3:o:dell:emc_powerstore_500t_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dell:emc_powerstore_1200t_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dell:emc_powerstore_3200t_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dell:emc_powerstore_5200t_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dell:emc_powerstore_9200t_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31234
1.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-31234
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
Dell |
CWE ids for CVE-2022-31234
-
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.Assigned by:
- nvd@nist.gov (Primary)
- security_alert@emc.com (Secondary)
References for CVE-2022-31234
-
https://www.dell.com/support/kbdoc/000201283
DSA-2022-159: Dell PowerStore Family Security Update for Multiple Vulnerabilities | Dell NederlandPatch;Vendor Advisory
Jump to