CVE-2024-53292

Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dell:vxrail_hyperconverged_infrastructure:*:*:*:*:*:*:*:*

History

04 Feb 2025, 16:16

Type Values Removed Values Added
References () https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities - () https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities - Vendor Advisory
CWE CWE-522
First Time Dell vxrail Hyperconverged Infrastructure
Dell
CPE cpe:2.3:a:dell:vxrail_hyperconverged_infrastructure:*:*:*:*:*:*:*:*

11 Dec 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-11 08:15

Updated : 2025-02-04 16:16


NVD link : CVE-2024-53292

Mitre link : CVE-2024-53292

CVE.ORG link : CVE-2024-53292


JSON object : View

Products Affected

dell

  • vxrail_hyperconverged_infrastructure
CWE
CWE-256

Unprotected Storage of Credentials

CWE-522

Insufficiently Protected Credentials