ID

VAR-202207-1541


CVE

CVE-2022-32498


TITLE

Dell's  Linux  for  powerstore command line interface  Vulnerability regarding uncontrolled search path elements in

Trust: 0.8

sources: JVNDB: JVNDB-2022-013674

DESCRIPTION

Dell EMC PowerStore, Versions prior to v3.0.0.0 contain a DLL Hijacking vulnerability in PSTCLI. A local attacker can potentially exploit this vulnerability to execute arbitrary code, escalate privileges, and bypass software allow list solutions, leading to system takeover or IP exposure. Dell's Linux for powerstore command line interface Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-32498 // JVNDB: JVNDB-2022-013674 // VULHUB: VHN-424539 // VULMON: CVE-2022-32498

AFFECTED PRODUCTS

vendor:dellmodel:powerstore command line interfacescope:ltversion:3.0.0.0-1732745

Trust: 1.0

vendor:デルmodel:powerstore command line interfacescope:eqversion: -

Trust: 0.8

vendor:デルmodel:powerstore command line interfacescope:eqversion:3.0.0.0-1732745

Trust: 0.8

vendor:デルmodel:powerstore command line interfacescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013674 // NVD: CVE-2022-32498

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-32498
value: HIGH

Trust: 1.0

security_alert@emc.com: CVE-2022-32498
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-32498
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-2135
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-32498
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

security_alert@emc.com: CVE-2022-32498
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 0.8
impactScore: 4.7
version: 3.1

Trust: 1.0

NVD: CVE-2022-32498
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-013674 // CNNVD: CNNVD-202207-2135 // NVD: CVE-2022-32498 // NVD: CVE-2022-32498

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.1

problemtype:Uncontrolled search path elements (CWE-427) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-424539 // JVNDB: JVNDB-2022-013674 // NVD: CVE-2022-32498

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202207-2135

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202207-2135

PATCH

title:Dell EMC PowerStore Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201966

Trust: 0.6

sources: CNNVD: CNNVD-202207-2135

EXTERNAL IDS

db:NVDid:CVE-2022-32498

Trust: 3.4

db:JVNDBid:JVNDB-2022-013674

Trust: 0.8

db:CNNVDid:CNNVD-202207-2135

Trust: 0.6

db:VULHUBid:VHN-424539

Trust: 0.1

db:VULMONid:CVE-2022-32498

Trust: 0.1

sources: VULHUB: VHN-424539 // VULMON: CVE-2022-32498 // JVNDB: JVNDB-2022-013674 // CNNVD: CNNVD-202207-2135 // NVD: CVE-2022-32498

REFERENCES

url:https://www.dell.com/support/kbdoc/000201283

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-32498

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-32498/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-424539 // VULMON: CVE-2022-32498 // JVNDB: JVNDB-2022-013674 // CNNVD: CNNVD-202207-2135 // NVD: CVE-2022-32498

SOURCES

db:VULHUBid:VHN-424539
db:VULMONid:CVE-2022-32498
db:JVNDBid:JVNDB-2022-013674
db:CNNVDid:CNNVD-202207-2135
db:NVDid:CVE-2022-32498

LAST UPDATE DATE

2024-08-14T14:17:50.367000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-424539date:2022-07-30T00:00:00
db:VULMONid:CVE-2022-32498date:2022-07-21T00:00:00
db:JVNDBid:JVNDB-2022-013674date:2023-09-11T08:16:00
db:CNNVDid:CNNVD-202207-2135date:2022-08-01T00:00:00
db:NVDid:CVE-2022-32498date:2022-07-30T01:24:17.157

SOURCES RELEASE DATE

db:VULHUBid:VHN-424539date:2022-07-21T00:00:00
db:VULMONid:CVE-2022-32498date:2022-07-21T00:00:00
db:JVNDBid:JVNDB-2022-013674date:2023-09-11T00:00:00
db:CNNVDid:CNNVD-202207-2135date:2022-07-21T00:00:00
db:NVDid:CVE-2022-32498date:2022-07-21T04:15:12.767