Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-1237 | 1 Dell | 1 Emc Scaleio | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
Dell EMC ScaleIO versions prior to 2.5, contain improper restriction of excessive authentication attempts on the Light installation Agent (LIA). This component is deployed on every server in the ScaleIO cluster and is used for central management of ScaleIO nodes. A remote malicious user, having network access to LIA, could potentially exploit this vulnerability to launch brute force guessing of user names and passwords of user accounts on the LIA. | |||||
CVE-2018-1238 | 1 Dell | 1 Emc Scaleio | 2024-02-04 | 8.5 HIGH | 7.5 HIGH |
Dell EMC ScaleIO versions prior to 2.5, contain a command injection vulnerability in the Light Installation Agent (LIA). This component is used for central management of ScaleIO deployment and uses shell commands for certain actions. A remote malicious user, with network access to LIA and knowledge of the LIA administrative password, could potentially exploit this vulnerability to run arbitrary commands as root on the systems where LIAs are installed. | |||||
CVE-2018-1205 | 1 Dell | 1 Emc Scaleio | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Dell EMC ScaleIO, versions prior to 2.5, do not properly handle some packet data in the MDM service. As a result, a remote attacker could potentially send specifically crafted packet data to the MDM service causing it to crash. | |||||
CVE-2017-8001 | 2 Dell, Linux | 2 Emc Scaleio, Linux Kernel | 2024-02-04 | 2.1 LOW | 8.4 HIGH |
An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials. |