Dell EMC PowerConnect M6220 up to 5.1.15.1 Password Storage credentials management
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.6 | $0-$5k | 0.00 |
A vulnerability has been found in Dell EMC PowerConnect M6220, PowerConnect M6348, PowerConnect 7000, PowerConnect 8024, PowerConnect M8024 and PowerConnect M8024-K up to 5.1.15.1 and classified as problematic. This vulnerability affects some unknown functionality of the component Password Storage. The manipulation with an unknown input leads to a credentials management vulnerability. The CWE definition for the vulnerability is CWE-255. As an impact it is known to affect confidentiality. CVE summarizes:
Dell EMC PowerConnect 8024, 7000, M6348, M6220, M8024 and M8024-K running firmware versions prior to 5.1.15.2 contain a plain-text password storage vulnerability. TACACS\Radius credentials are stored in plain text in the system settings menu. An authenticated malicious user with access to the system settings menu may obtain the exposed password to use it in further attacks.
The weakness was disclosed 08/20/2019 (Website). The advisory is available at dell.com. This vulnerability was named CVE-2019-3753 since 01/03/2019. Local access is required to approach this attack. A single authentication is required for exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1552 by the MITRE ATT&CK project.
Upgrading to version 5.1.15.2 eliminates this vulnerability.
Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
- PowerConnect 7000
- PowerConnect 8024
- PowerConnect M6220
- PowerConnect M6348
- PowerConnect M8024
- PowerConnect M8024-K
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.7VulDB Meta Temp Score: 5.6
VulDB Base Score: 3.3
VulDB Temp Score: 3.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.5
NVD Vector: 🔍
CNA Base Score: 7.2
CNA Vector (Dell): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Credentials managementCWE: CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: PowerConnect M6220/PowerConnect M6348/PowerConnect 7000/PowerConnect 8024/PowerConnect M8024/PowerConnect M8024-K 5.1.15.2
Timeline
01/03/2019 🔍08/20/2019 🔍
08/21/2019 🔍
11/27/2023 🔍
Sources
Vendor: dellemc.comAdvisory: dell.com
Status: Not defined
Confirmation: 🔍
CVE: CVE-2019-3753 (🔍)
Entry
Created: 08/21/2019 10:15 AMUpdated: 11/27/2023 12:50 PM
Changes: 08/21/2019 10:15 AM (57), 08/01/2020 04:11 PM (1), 11/27/2023 12:50 PM (14)
Complete: 🔍
Cache ID: 18:7BC:40
No comments yet. Languages: en.
Please log in to comment.