Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
References
| Link | Resource |
|---|---|
| https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 | Patch Vendor Advisory |
| https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:29
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 8.2 |
| References | () https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 - Patch, Vendor Advisory |
05 Jan 2022, 14:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:dell:powerpath_management_appliance:3.0:patch_01:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:3.0:-:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:3.2:*:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:2.6:*:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:3.1:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 6.7 |
| References | (CONFIRM) https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 - Patch, Vendor Advisory |
21 Dec 2021, 17:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-12-21 17:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43587
Mitre link : CVE-2021-43587
CVE.ORG link : CVE-2021-43587
JSON object : View
Products Affected
dell
- powerpath_management_appliance
CWE
CWE-321
Use of Hard-coded Cryptographic Key
