Description
In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user may potentially escalate their privileges to root due to authorization checks not being performed on certain perl scripts. This may potentially be exploited by an attacker to run arbitrary commands as root on the targeted VNX Control Station system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-14098 | In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user may potentially escalate their privileges to root due to authorization checks not being performed on certain perl scripts. This may potentially be exploited by an attacker to run arbitrary commands as root on the targeted VNX Control Station system. |
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-05T14:47:43.635Z
Reserved: 2016-12-29T00:00:00.000Z
Link: CVE-2017-4985
No data.
Status : Deferred
Published: 2017-06-19T12:29:00.293
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-4985
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD