First published: Mon Dec 28 2015(Updated: )
Directory traversal vulnerability in the API in EMC Secure Remote Services Virtual Edition 3.x before 3.10 allows remote authenticated users to read log files via a crafted parameter.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Secure Remote Services | =3.0 | |
Dell EMC Secure Remote Services | =3.02 | |
Dell EMC Secure Remote Services | =3.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6852 is classified as a medium severity vulnerability due to the potential exposure of sensitive log files.
To fix CVE-2015-6852, upgrade EMC Secure Remote Services to version 3.10 or later.
CVE-2015-6852 affects EMC Secure Remote Services Virtual Edition versions 3.0, 3.02, and 3.03.
CVE-2015-6852 is a directory traversal vulnerability that allows unauthorized file access.
Yes, CVE-2015-6852 can be exploited by authenticated remote users.