CVE-2017-8013

EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. Affected accounts are: "Apollo System Test", "emc.dpa.agent.logon" and "emc.dpa.metrics.logon". An attacker with knowledge of the password could potentially use these accounts via REST APIs to gain unauthorized access to EMC Data Protection Advisor (including potentially access with administrative privileges).
References
Link Resource
http://seclists.org/fulldisclosure/2017/Sep/36 Mailing List Third Party Advisory
http://www.securitytracker.com/id/1039370 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/100846 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:emc:data_protection_advisor:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:emc:data_protection_advisor:6.3.0:*:*:*:*:*:*:*

Information

Published : 2018-03-16 13:29

Updated : 2018-04-13 06:08


NVD link : CVE-2017-8013

Mitre link : CVE-2017-8013


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

emc

  • data_protection_advisor