First published: Thu Oct 19 2017(Updated: )
** DISPUTED ** This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Data Protection Advisor 6.3.0. Authentication is required to exploit this vulnerability. The specific flaw exists within the EMC DPA Application service, which listens on TCP port 9002 by default. When parsing the preScript parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute arbitrary code under the context of SYSTEM. Was ZDI-CAN-4697. NOTE: Dell EMC disputes that this is a vulnerability.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Data Protection Advisor | =6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10955 is classified as a disputed vulnerability with potential for remote code execution on EMC Data Protection Advisor 6.3.0.
To mitigate CVE-2017-10955, ensure that you apply the latest patches for EMC Data Protection Advisor and follow best security practices.
CVE-2017-10955 specifically affects EMC Data Protection Advisor version 6.3.0.
CVE-2017-10955 requires authentication, meaning that only authenticated remote attackers can exploit this vulnerability.
The specific flaw in CVE-2017-10955 exists within the EMC DPA Application service that listens on TCP port.