Impact
Dell PowerFlex Manager versions up to 4.6.2 include a use of a broken or risky cryptographic algorithm in the SSH component. An attacker with low privileges and local access could exploit this flaw, allowing the bypass of protection mechanisms. This results in the attacker gaining additional permissions or executing privileged operations beyond their authorized scope, a weakness identified as CWE-327.
Affected Systems
Affected systems are Dell PowerFlex Manager, including the standard, appliance, and rack variants, all running any revision 4.6.2 or earlier.
Risk and Exploitability
Based on the description, it is inferred that the CVSS score of 3.6 indicates low severity, and the EPSS score was not published, implying a low likelihood of known exploitation. Based on the description, it is inferred that the vulnerability requires local access by a low‑privileged user, so remote exploitation is unlikely. The risk is mitigated by enforcing least‑privilege local accounts and monitoring for misuse. No CISA KEV listing is present.
OpenCVE Enrichment