First published: Wed Dec 06 2017(Updated: )
The SMI-S service in Dell Storage Manager versions earlier than 16.3.20 (aka 2016 R3.20) is protected using a hard-coded password. A remote user with the knowledge of the password might potentially disable the SMI-S service via HTTP requests, affecting storage management and monitoring functionality via the SMI-S interface. This issue, aka DSM-30415, only affects a Windows installation of the Data Collector (not applicable to the virtual appliance).
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Storage Manager 2016 | <16.3.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14374 is classified as a high severity vulnerability due to the potential for remote code execution and impact on storage management.
To fix CVE-2017-14374, upgrade Dell Storage Manager to version 16.3.20 or later to eliminate the use of the hard-coded password.
CVE-2017-14374 affects Dell Storage Manager versions prior to 16.3.20 that utilize a hard-coded password for the SMI-S service.
Yes, CVE-2017-14374 can be exploited remotely by a user who knows the hard-coded password to disable the SMI-S service.
The impact of CVE-2017-14374 includes the potential disabling of the SMI-S service, which can disrupt storage management and monitoring functionality.