ID

VAR-201711-0052


CVE

CVE-2017-14375


TITLE

plural EMC Vulnerabilities related to authorization, authority, and access control in products

Trust: 0.8

sources: JVNDB: JVNDB-2017-009917

DESCRIPTION

EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system. plural EMC The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of EMC Unisphere For VMAX vApp Manager. Authentication is not required to exploit this vulnerability.The specific flaw exists within the ORBServlet. The vulnerability is caused by improper access controls that allow the creation of admin credentials. An attacker can leverage this vulnerability to disclose sensitive information under the context of the web application. Multiple EMC Products are prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass authentication mechanism and perform unauthorized actions. This may lead to further attacks. Details: The vApp Manager contains a servlet that does not perform proper authentication checks before processing AMF messages for user creation requests. A remote unauthenticated attacker, by having knowledge of the message format, may potentially create new user accounts with administrative privileges, and then log in to the affected application. Link to remedies: Customers can download software for EMC Unisphere for VMAX Virtual Appliance 8.4.0.15 OVA and ISO from EMC Online Support at https://support.emc.com/downloads/27045_Unisphere-for-VMAX Customers are recommended to contact Customer Support and place a Customer Service Request for all other fixes. Credit: EMC would like to thank rgod working with Trend Micro's Zero Day Initiative, for reporting this issue. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJZ90fjAAoJEHbcu+fsE81ZtNYIAIQvi8RPtbxQv8PA5Q2vIsij sCo3qsDMMA1wSViqiHVS03HmJXC/ju/snPKEwC7tGAyrwzdNxSrqUzQNwQur9V94 r7Uqfk/LxhuyXypUujw61UsPd9v7mhZ1x/kzxSkVP8000LMi2r6eihyBC3pI+eZ8 d3vr7V8x+jtco9YD9bzMYqwXsMWqINJTwZrTam+xpHIqZax/qsaHLx7aFK6nwT4d 6V2t9Jlyt7B80TyQuHDlA4CXJXMbW37zPi9iOiJwdHIB8QbM6tz8cVuM1jjCq922 5xDA27SEKPFXyl6O9zNqrFL0tahMwtLAizO8QM9b03FXaqdq7pnaCMBjgZS2jVc= =Dt5B -----END PGP SIGNATURE-----

Trust: 2.7

sources: NVD: CVE-2017-14375 // JVNDB: JVNDB-2017-009917 // ZDI: ZDI-17-919 // BID: 101673 // VULMON: CVE-2017-14375 // PACKETSTORM: 144815

AFFECTED PRODUCTS

vendor:emcmodel:vmax emanagementscope:lteversion:1.4

Trust: 1.0

vendor:emcmodel:solutions enablerscope:ltversion:8.4.0.15

Trust: 1.0

vendor:dellmodel:emc unispherescope:ltversion:8.4.0.15

Trust: 1.0

vendor:emcmodel:vasascope:ltversion:8.4.0.512

Trust: 1.0

vendor:dell emc old emcmodel:vasa provider virtual appliancescope:ltversion:8.4.0.512

Trust: 0.8

vendor:dell emc old emcmodel:vmax embedded managementscope:lteversion:1.4 (enginuity release 5977.1125.1125 )

Trust: 0.8

vendor:dell emc old emcmodel:solutions enablerscope:ltversion:virtual appliance 8.4.0.15

Trust: 0.8

vendor:dell emc old emcmodel:unispherescope:ltversion:for vmax virtual appliance 8.4.0.15

Trust: 0.8

vendor:emcmodel:unisphere for vmaxscope: - version: -

Trust: 0.7

vendor:emcmodel:unispherescope:eqversion:1.6

Trust: 0.6

vendor:emcmodel:vmax emanagementscope:eqversion:1.4

Trust: 0.6

vendor:emcmodel:solutions enablerscope:eqversion:6.5.883

Trust: 0.6

vendor:emcmodel:unispherescope:eqversion:1.0

Trust: 0.6

vendor:emcmodel:unispherescope:eqversion:8.1

Trust: 0.6

vendor:emcmodel:unispherescope:eqversion:1.1

Trust: 0.6

vendor:emcmodel:solutions enablerscope:eqversion: -

Trust: 0.6

vendor:emcmodel:unispherescope:eqversion:1.5

Trust: 0.6

vendor:emcmodel:vasa provider virtual appliancescope:eqversion:8.4.0

Trust: 0.3

vendor:emcmodel:vasa provider virtual appliancescope:eqversion:8.3.0

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:eqversion:8.3

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:eqversion:8.2

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:eqversion:8.0.2

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:eqversion:8.0.1

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:eqversion:8.0

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:eqversion:8.0.3.4

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:eqversion:8.0.2.6

Trust: 0.3

vendor:emcmodel:solutions enablerscope:eqversion:8.3

Trust: 0.3

vendor:emcmodel:solutions enablerscope:eqversion:8.2

Trust: 0.3

vendor:emcmodel:solutions enablerscope:eqversion:8.0

Trust: 0.3

vendor:emcmodel:solutions enablerscope:eqversion:8.1.0.3

Trust: 0.3

vendor:emcmodel:vasa virtual appliancescope:neversion:8.4.0.512

Trust: 0.3

vendor:emcmodel:unisphere for vmaxscope:neversion:8.4.0.15

Trust: 0.3

vendor:emcmodel:solutions enablerscope:neversion:8.4.0.15

Trust: 0.3

sources: ZDI: ZDI-17-919 // BID: 101673 // JVNDB: JVNDB-2017-009917 // CNNVD: CNNVD-201709-1099 // NVD: CVE-2017-14375

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14375
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-14375
value: CRITICAL

Trust: 0.8

ZDI: CVE-2017-14375
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-201709-1099
value: CRITICAL

Trust: 0.6

VULMON: CVE-2017-14375
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14375
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

ZDI: CVE-2017-14375
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

nvd@nist.gov: CVE-2017-14375
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-17-919 // VULMON: CVE-2017-14375 // JVNDB: JVNDB-2017-009917 // CNNVD: CNNVD-201709-1099 // NVD: CVE-2017-14375

PROBLEMTYPE DATA

problemtype:CWE-290

Trust: 1.0

problemtype:CWE-264

Trust: 0.8

sources: JVNDB: JVNDB-2017-009917 // NVD: CVE-2017-14375

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-1099

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201709-1099

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009917

PATCH

title:Top Pageurl:https://www.dellemc.com/ja-jp/index.htm

Trust: 0.8

title:EMC has issued an update to correct this vulnerability.url:http://seclists.org/fulldisclosure/2017/Oct/70

Trust: 0.7

title:Multiple EMC Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100064

Trust: 0.6

sources: ZDI: ZDI-17-919 // JVNDB: JVNDB-2017-009917 // CNNVD: CNNVD-201709-1099

EXTERNAL IDS

db:NVDid:CVE-2017-14375

Trust: 3.6

db:BIDid:101673

Trust: 2.0

db:SECTRACKid:1039704

Trust: 1.7

db:JVNDBid:JVNDB-2017-009917

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-5070

Trust: 0.7

db:ZDIid:ZDI-17-919

Trust: 0.7

db:CNNVDid:CNNVD-201709-1099

Trust: 0.6

db:VULMONid:CVE-2017-14375

Trust: 0.1

db:PACKETSTORMid:144815

Trust: 0.1

sources: ZDI: ZDI-17-919 // VULMON: CVE-2017-14375 // BID: 101673 // JVNDB: JVNDB-2017-009917 // PACKETSTORM: 144815 // CNNVD: CNNVD-201709-1099 // NVD: CVE-2017-14375

REFERENCES

url:http://seclists.org/fulldisclosure/2017/oct/70

Trust: 3.5

url:http://www.securityfocus.com/bid/101673

Trust: 1.8

url:http://www.securitytracker.com/id/1039704

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-14375

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14375

Trust: 0.8

url:http://www.emc.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/290.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://support.emc.com/downloads/27045_unisphere-for-vmax

Trust: 0.1

sources: ZDI: ZDI-17-919 // VULMON: CVE-2017-14375 // BID: 101673 // JVNDB: JVNDB-2017-009917 // PACKETSTORM: 144815 // CNNVD: CNNVD-201709-1099 // NVD: CVE-2017-14375

CREDITS

rgod

Trust: 0.8

sources: ZDI: ZDI-17-919 // PACKETSTORM: 144815

SOURCES

db:ZDIid:ZDI-17-919
db:VULMONid:CVE-2017-14375
db:BIDid:101673
db:JVNDBid:JVNDB-2017-009917
db:PACKETSTORMid:144815
db:CNNVDid:CNNVD-201709-1099
db:NVDid:CVE-2017-14375

LAST UPDATE DATE

2025-04-20T23:25:55.234000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-919date:2017-11-20T00:00:00
db:VULMONid:CVE-2017-14375date:2021-08-05T00:00:00
db:BIDid:101673date:2017-12-19T22:36:00
db:JVNDBid:JVNDB-2017-009917date:2017-11-28T00:00:00
db:CNNVDid:CNNVD-201709-1099date:2019-10-23T00:00:00
db:NVDid:CVE-2017-14375date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:ZDIid:ZDI-17-919date:2017-11-20T00:00:00
db:VULMONid:CVE-2017-14375date:2017-11-01T00:00:00
db:BIDid:101673date:2017-10-30T00:00:00
db:JVNDBid:JVNDB-2017-009917date:2017-11-28T00:00:00
db:PACKETSTORMid:144815date:2017-10-31T15:02:42
db:CNNVDid:CNNVD-201709-1099date:2017-09-26T00:00:00
db:NVDid:CVE-2017-14375date:2017-11-01T01:29:00.450