Dell Unity, Dell UnityVSA, and Dell Unity XT versions prior to 5.2.0.0.5.173 contain a plain-text password storage vulnerability when certain off-array tools are run on the system. The credentials of a user with high privileges are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33496 | Dell Unity, Dell UnityVSA, and Dell Unity XT versions prior to 5.2.0.0.5.173 contain a plain-text password storage vulnerability when certain off-array tools are run on the system. The credentials of a user with high privileges are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.dell.com/support/kbdoc/000199050 |
|
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-17T03:23:38.857Z
Reserved: 2022-04-12T00:00:00.000Z
Link: CVE-2022-29085
No data.
Status : Modified
Published: 2022-06-02T21:15:07.880
Modified: 2024-11-21T06:58:27.610
Link: CVE-2022-29085
No data.
OpenCVE Enrichment
No data.
EUVD