CVE-2015-0514

EMC M&R (aka Watch4Net) before 6.5u1 and ViPR SRM before 3.6.1 might allow remote attackers to obtain cleartext data-center discovery credentials by leveraging certain SRM access to conduct a decryption attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:emc:watch4net:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:emc:vipr_srm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:23

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html - () http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html -
References () http://packetstormsecurity.com/files/130910/EMC-M-R-Watch4net-Insecure-Credential-Storage.html - () http://packetstormsecurity.com/files/130910/EMC-M-R-Watch4net-Insecure-Credential-Storage.html -
References () http://seclists.org/fulldisclosure/2015/Mar/112 - Exploit () http://seclists.org/fulldisclosure/2015/Mar/112 - Exploit
References () http://www.securityfocus.com/archive/1/534923/100/0/threaded - () http://www.securityfocus.com/archive/1/534923/100/0/threaded -
References () http://www.securityfocus.com/bid/72257 - () http://www.securityfocus.com/bid/72257 -
References () http://www.securitytracker.com/id/1031567 - () http://www.securitytracker.com/id/1031567 -
References () https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html - Exploit () https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html - Exploit

Information

Published : 2015-01-21 15:17

Updated : 2024-11-21 02:23


NVD link : CVE-2015-0514

Mitre link : CVE-2015-0514

CVE.ORG link : CVE-2015-0514


JSON object : View

Products Affected

emc

  • watch4net
  • vipr_srm
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor