Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
References
Link | Resource |
---|---|
https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 | Patch Vendor Advisory |
https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 8.2 |
References | () https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 - Patch, Vendor Advisory |
05 Jan 2022, 14:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dell:powerpath_management_appliance:3.0:patch_01:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:3.0:-:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:3.2:*:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:2.6:*:*:*:*:*:*:* cpe:2.3:a:dell:powerpath_management_appliance:3.1:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 6.7 |
References | (CONFIRM) https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260 - Patch, Vendor Advisory |
21 Dec 2021, 17:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-21 17:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43587
Mitre link : CVE-2021-43587
CVE.ORG link : CVE-2021-43587
JSON object : View
Products Affected
dell
- powerpath_management_appliance
CWE
CWE-321
Use of Hard-coded Cryptographic Key