Dell Update Manager Plugin, versions 1.4.0 through 1.5.0, contains a Plain-text Password Storage Vulnerability in Log file. A remote high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26033 | Dell Update Manager Plugin, versions 1.4.0 through 1.5.0, contains a Plain-text Password Storage Vulnerability in Log file. A remote high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 27 Jan 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dell
Dell openmanage Enterprise Update Manager |
|
| Weaknesses | CWE-522 | |
| CPEs | cpe:2.3:a:dell:openmanage_enterprise_update_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dell
Dell openmanage Enterprise Update Manager |
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-02T01:03:51.393Z
Reserved: 2024-03-13T15:44:22.627Z
Link: CVE-2024-28971
Updated: 2024-08-02T01:03:51.393Z
Status : Analyzed
Published: 2024-05-08T16:15:08.747
Modified: 2025-01-27T18:43:23.280
Link: CVE-2024-28971
No data.
OpenCVE Enrichment
No data.
EUVD