ID

VAR-201811-0038


CVE

CVE-2018-15772


TITLE

Dell EMC RecoverPoint and RecoverPoint for VMs Vulnerable to resource exhaustion

Trust: 0.8

sources: JVNDB: JVNDB-2018-014242

DESCRIPTION

Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an uncontrolled resource consumption vulnerability. A malicious boxmgmt user may potentially be able to consume large amount of CPU bandwidth to make the system slow or to determine the existence of any system file via Boxmgmt CLI. Dell EMC RecoverPoint are prone to an information-disclosure vulnerability and a denial-of-service vulnerability. Successfully exploiting these issues may allow an attacker to obtain sensitive information or to consume excessive resources, resulting in a denial of service. The former is a set of disaster recovery and data protection software, and the latter is a set of disaster recovery solutions for VMware environments. Link to remedies: Customers can download software from: https://support.emc.com/search/?text=RecoverPoint&searchLang=en_US&facetResource=DOWN Credits: Dell EMC would like to thank Paul Taylor (@bao7uo) for reporting these vulnerabilities. Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEP5nobPoCj3pTvhAZgSlofD2Yi6cFAlvktrEACgkQgSlofD2Y i6fVXw//QXRWQ+8d/vlhEeHj+xcCX8rggZXI9SnR0rNTEwfoaqRZugmauXNPMwRL Jvkp96Al0RrTLNNxxq9iyqjRnGqUdpHgNlAP4kq+Zs785LlKrvj/2WH/AshwZhZM yDdusIUVHpcV0eR/fm57gvINeGkn0ZU/Ili4xN9JF6CRuyNihi3LvlGlcsXwyQC5 Ja9HCOgM82uUz6NhsWw/GAD9Jxx/2ID3SfqL/m7/o7mioY+jlhGaL8JBlPurXSe6 atP851X2Fj4VnMNNgbvL55JF6/HTFhk2H4JmiuELWYKiCmQvWcp4b6tzzOvyA2VN E71DlqVi33IvPbIbZtE2Ji/WLVrIvlFhXuT/4eihvX5bRt4F731+EPSW6jbKrqcT l4bMYdqouvqMt4BU4Fcm2P5Ynv43rw+mZFnkluQ/XdXBA7micA5QlUZPSD1xKyCS 761uZwl9ccCymk8GRcwFaX3c7WIc1x7yLjbQ+JfvnFiD7TF7xCEdqZG/yD6FAzwz sAXgNIjmPtq5XxL9DpHvnX4NpzTV87U7shfjPiU+mn1n/xaqo+c/MZGDWyloN7LN sPWfwaBHV6I1GZMEDJ/1h8cJV/f2dvEfV5gHBEV2t+nmNvddpjZC4cAKCXd8BlAC fRgraWppWLqHRv3EJVKDEzJlbUks8eQr/HmFovilRaQj/s5ljwg= =s3w/ -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2018-15772 // JVNDB: JVNDB-2018-014242 // BID: 105916 // VULHUB: VHN-126065 // PACKETSTORM: 150264

AFFECTED PRODUCTS

vendor:dellmodel:emc recoverpointscope:ltversion:5.1.2.1

Trust: 1.0

vendor:dellmodel:emc recoverpoint for virtual machinesscope:ltversion:5.2.0.2

Trust: 1.0

vendor:dell emc old emcmodel:recoverpointscope:ltversion:5.1.2.1

Trust: 0.8

vendor:dell emc old emcmodel:recoverpoint for virtual machinesscope:ltversion:5.2.0.2

Trust: 0.8

vendor:dellmodel:emc recoverpoint for virtual machinesscope:eqversion:5.1.1

Trust: 0.3

vendor:dellmodel:emc recoverpoint for virtual machinesscope:eqversion:5.1.1.3

Trust: 0.3

vendor:dellmodel:emc recoverpoint for virtual machinesscope:eqversion:5.1.1.2

Trust: 0.3

vendor:dellmodel:emc recoverpoint for virtual machinesscope:eqversion:5.1

Trust: 0.3

vendor:dellmodel:emc recoverpointscope:eqversion:5.1.2

Trust: 0.3

vendor:dellmodel:emc recoverpointscope:eqversion:5.1.0.1

Trust: 0.3

vendor:dellmodel:emc recoverpointscope:eqversion:5.1

Trust: 0.3

vendor:dellmodel:emc recoverpoint for virtual machinesscope:neversion:5.2.0.2

Trust: 0.3

vendor:dellmodel:emc recoverpointscope:neversion:5.1.2.1

Trust: 0.3

sources: BID: 105916 // JVNDB: JVNDB-2018-014242 // NVD: CVE-2018-15772

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15772
value: HIGH

Trust: 1.0

NVD: CVE-2018-15772
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201811-290
value: LOW

Trust: 0.6

VULHUB: VHN-126065
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2018-15772
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-126065
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15772
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-126065 // JVNDB: JVNDB-2018-014242 // CNNVD: CNNVD-201811-290 // NVD: CVE-2018-15772

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-126065 // JVNDB: JVNDB-2018-014242 // NVD: CVE-2018-15772

THREAT TYPE

network

Trust: 0.3

sources: BID: 105916

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201811-290

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014242

PATCH

title:Dell EMC RecoverPoint Data Protection Softwareurl:https://shop.dellemc.com/en-us/Product-Family/EMC-RecoverPoint-Products/Dell-EMC-RecoverPoint-for-Virtual-Machines-Data-Protection-Software/p/EMC-RecoverPoint-VM?PID=EMC_OTHR-RCVRPTVM-EB48_SPLSH

Trust: 0.8

title:Dell EMC RecoverPoint for Virtual Machines Data Protection Softwareurl:https://shop.dellemc.com/en-us/Solve-For/STORAGE-PRODUCTS/Dell-EMC-RecoverPoint-Data-Protection-Software/p/EMC-RecoverPoint?productCode=&fromPage=PVP

Trust: 0.8

title:Dell EMC RecoverPoint and RecoverPoint for Virtual Machines Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86722

Trust: 0.6

sources: JVNDB: JVNDB-2018-014242 // CNNVD: CNNVD-201811-290

EXTERNAL IDS

db:NVDid:CVE-2018-15772

Trust: 2.9

db:BIDid:105916

Trust: 1.4

db:SECTRACKid:1042059

Trust: 1.1

db:JVNDBid:JVNDB-2018-014242

Trust: 0.8

db:CNNVDid:CNNVD-201811-290

Trust: 0.7

db:CNVDid:CNVD-2020-15726

Trust: 0.1

db:VULHUBid:VHN-126065

Trust: 0.1

db:PACKETSTORMid:150264

Trust: 0.1

sources: VULHUB: VHN-126065 // BID: 105916 // JVNDB: JVNDB-2018-014242 // PACKETSTORM: 150264 // CNNVD: CNNVD-201811-290 // NVD: CVE-2018-15772

REFERENCES

url:https://seclists.org/fulldisclosure/2018/nov/34

Trust: 2.8

url:http://www.securityfocus.com/bid/105916

Trust: 1.1

url:http://www.securitytracker.com/id/1042059

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15772

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15772

Trust: 0.8

url:http://dell.com

Trust: 0.3

url:https://support.emc.com/servicecenter/contactemc/).

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15771

Trust: 0.1

url:https://support.emc.com/kb/468307).

Trust: 0.1

url:https://support.emc.com/search/?text=recoverpoint&searchlang=en_us&facetresource=down

Trust: 0.1

sources: VULHUB: VHN-126065 // BID: 105916 // JVNDB: JVNDB-2018-014242 // PACKETSTORM: 150264 // CNNVD: CNNVD-201811-290 // NVD: CVE-2018-15772

CREDITS

Paul Taylor (@bao7uo)

Trust: 0.3

sources: BID: 105916

SOURCES

db:VULHUBid:VHN-126065
db:BIDid:105916
db:JVNDBid:JVNDB-2018-014242
db:PACKETSTORMid:150264
db:CNNVDid:CNNVD-201811-290
db:NVDid:CVE-2018-15772

LAST UPDATE DATE

2024-11-23T22:00:12.258000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-126065date:2019-02-04T00:00:00
db:BIDid:105916date:2018-11-14T00:00:00
db:JVNDBid:JVNDB-2018-014242date:2019-03-14T00:00:00
db:CNNVDid:CNNVD-201811-290date:2019-02-13T00:00:00
db:NVDid:CVE-2018-15772date:2024-11-21T03:51:26.520

SOURCES RELEASE DATE

db:VULHUBid:VHN-126065date:2018-11-13T00:00:00
db:BIDid:105916date:2018-11-14T00:00:00
db:JVNDBid:JVNDB-2018-014242date:2019-03-14T00:00:00
db:PACKETSTORMid:150264date:2018-11-12T17:05:21
db:CNNVDid:CNNVD-201811-290date:2018-11-12T00:00:00
db:NVDid:CVE-2018-15772date:2018-11-13T14:29:00.293