EMC M&R (aka Watch4Net) before 6.5u1 and ViPR SRM before 3.6.1 might allow remote attackers to obtain cleartext data-center discovery credentials by leveraging certain SRM access to conduct a decryption attack.
References
Configurations
History
21 Nov 2024, 02:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html - | |
References | () http://packetstormsecurity.com/files/130910/EMC-M-R-Watch4net-Insecure-Credential-Storage.html - | |
References | () http://seclists.org/fulldisclosure/2015/Mar/112 - Exploit | |
References | () http://www.securityfocus.com/archive/1/534923/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/72257 - | |
References | () http://www.securitytracker.com/id/1031567 - | |
References | () https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html - Exploit |
Information
Published : 2015-01-21 15:17
Updated : 2024-11-21 02:23
NVD link : CVE-2015-0514
Mitre link : CVE-2015-0514
CVE.ORG link : CVE-2015-0514
JSON object : View
Products Affected
emc
- watch4net
- vipr_srm
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor