Products
Dell PowerProtect Data Domain
- before 7.13.0.0
- LTS 7.7.5.40
- LTS 7.10.1.30
Source
security_alert@emc.com
Tags
CVE-2024-29175 details
Published : June 26, 2024, 3:15 a.m.
Last Modified : June 26, 2024, 12:44 p.m.
Last Modified : June 26, 2024, 12:44 p.m.
Description
Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information.
CVSS Score
1 | 2 | 3 | 4 | 5.9 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm | The product uses a broken or risky cryptographic algorithm or protocol. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
5.9
Exploitability Score
2.2
Impact Score
3.6
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References
URL | Source |
---|---|
https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities | security_alert@emc.com |
This website uses the NVD API, but is not approved or certified by it.