ID

VAR-202207-1574


CVE

CVE-2022-34367


TITLE

Dell's  Dell EMC Data Protection Central  Cross-site request forgery vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-013532

DESCRIPTION

Dell EMC Data Protection Central versions 19.1, 19.2, 19.3, 19.4, 19.5, 19.6, contain(s) a Cross-Site Request Forgery Vulnerability. A(n) remote unauthenticated attacker could potentially exploit this vulnerability, leading to processing of unintended server operations. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-34367 // JVNDB: JVNDB-2022-013532 // VULHUB: VHN-426683 // VULMON: CVE-2022-34367

AFFECTED PRODUCTS

vendor:dellmodel:emc data protection centralscope:gteversion:19.1

Trust: 1.0

vendor:dellmodel:emc data protection centralscope:ltversion:19.7

Trust: 1.0

vendor:デルmodel:dell emc data protection centralscope: - version: -

Trust: 0.8

vendor:デルmodel:dell emc data protection centralscope:eqversion:19.1 that's all 19.7

Trust: 0.8

vendor:デルmodel:dell emc data protection centralscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013532 // NVD: CVE-2022-34367

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34367
value: HIGH

Trust: 1.0

security_alert@emc.com: CVE-2022-34367
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-34367
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-2133
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-34367
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

security_alert@emc.com: CVE-2022-34367
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 1.0

NVD: CVE-2022-34367
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-013532 // CNNVD: CNNVD-202207-2133 // NVD: CVE-2022-34367 // NVD: CVE-2022-34367

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.1

problemtype:Cross-site request forgery (CWE-352) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-426683 // JVNDB: JVNDB-2022-013532 // NVD: CVE-2022-34367

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-2133

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-202207-2133

PATCH

title:Dell EMC Data Protection Central Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201710

Trust: 0.6

sources: CNNVD: CNNVD-202207-2133

EXTERNAL IDS

db:NVDid:CVE-2022-34367

Trust: 3.4

db:JVNDBid:JVNDB-2022-013532

Trust: 0.8

db:CNNVDid:CNNVD-202207-2133

Trust: 0.6

db:VULHUBid:VHN-426683

Trust: 0.1

db:VULMONid:CVE-2022-34367

Trust: 0.1

sources: VULHUB: VHN-426683 // VULMON: CVE-2022-34367 // JVNDB: JVNDB-2022-013532 // CNNVD: CNNVD-202207-2133 // NVD: CVE-2022-34367

REFERENCES

url:https://www.dell.com/support/kbdoc/en-us/000201505/dsa-2022-192-dell-emc-data-protection-central-security-update-for-multiple-vulnerabilities

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-34367

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34367/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-426683 // VULMON: CVE-2022-34367 // JVNDB: JVNDB-2022-013532 // CNNVD: CNNVD-202207-2133 // NVD: CVE-2022-34367

SOURCES

db:VULHUBid:VHN-426683
db:VULMONid:CVE-2022-34367
db:JVNDBid:JVNDB-2022-013532
db:CNNVDid:CNNVD-202207-2133
db:NVDid:CVE-2022-34367

LAST UPDATE DATE

2024-08-14T14:31:03.370000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426683date:2022-07-27T00:00:00
db:VULMONid:CVE-2022-34367date:2022-07-21T00:00:00
db:JVNDBid:JVNDB-2022-013532date:2023-09-08T08:28:00
db:CNNVDid:CNNVD-202207-2133date:2022-07-28T00:00:00
db:NVDid:CVE-2022-34367date:2022-07-27T19:20:32.427

SOURCES RELEASE DATE

db:VULHUBid:VHN-426683date:2022-07-21T00:00:00
db:VULMONid:CVE-2022-34367date:2022-07-21T00:00:00
db:JVNDBid:JVNDB-2022-013532date:2023-09-08T00:00:00
db:CNNVDid:CNNVD-202207-2133date:2022-07-21T00:00:00
db:NVDid:CVE-2022-34367date:2022-07-21T04:15:13.590