Vulnerabilities (CVE)

Filtered by vendor Dell Subscribe
Filtered by product Powerstore T
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-26869 1 Dell 3 Powerstore T, Powerstore X, Powerstoreos 2024-02-04 7.5 HIGH 9.8 CRITICAL
Dell PowerStore versions 2.0.0.x, 2.0.1.x and 2.1.0.x contains an open port vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure and arbitrary code execution.
CVE-2022-26867 1 Dell 3 Powerstore T, Powerstore X, Powerstoreos 2024-02-04 6.0 MEDIUM 8.0 HIGH
PowerStore SW v2.1.1.0 supports the option to export data to either a CSV or an XLSX file. The data is taken as is, without any validation or sanitization. It allows a malicious, authenticated user to inject payloads that might get interpreted as formulas by the corresponding spreadsheet application that is being used to open the CSV/XLSX file.
CVE-2022-22556 1 Dell 3 Powerstore T, Powerstore X, Powerstoreos 2024-02-04 7.8 HIGH 7.5 HIGH
Dell PowerStore contains an Uncontrolled Resource Consumption Vulnerability in PowerStore User Interface. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the Denial of Service.
CVE-2022-26868 1 Dell 3 Powerstore T, Powerstore X, Powerstoreos 2024-02-04 7.2 HIGH 7.8 HIGH
Dell EMC PowerStore versions 2.0.0.x, 2.0.1.x, and 2.1.0.x are vulnerable to a command injection flaw. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system takeover by an attacker.
CVE-2022-22557 1 Dell 3 Powerstore T, Powerstore X, Powerstoreos 2024-02-04 7.2 HIGH 7.8 HIGH
PowerStore contains Plain-Text Password Storage Vulnerability in PowerStore X & T environments running versions 2.0.0.x and 2.0.1.x A locally authenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.