Impact
The vulnerability allows a system administrator to read stored user credentials in plain text within VxRail Manager. This flaw enables the attacker to learn legitimate usernames and passwords, potentially gaining unauthorized access to the application under the privileges of the compromised account. The weakness is a plain-text password storage issue, classified as CWE-532.
Affected Systems
Dell VxRail, all versions earlier than 7.0.200, includes the VxRail Manager component.
Risk and Exploitability
The CVSS score of 6.7 reflects a moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires the attacker to have sys‑administrator privileges on the VxRail system; thus, compromise of a privileged local account can expose credentials and allow escalation within the application. No remote code execution or denial of service is described. Given the moderate CVSS score and the need for elevated local access, the risk is considered moderate but significant for environments that rely on credential integrity.
OpenCVE Enrichment