First published: Fri Jan 05 2018(Updated: )
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Avamar Server | =7.1-21-sp2 | |
EMC Avamar Server | =7.1-145-sp1 | |
EMC Avamar Server | =7.1-302 | |
EMC Avamar Server | =7.1-370 | |
EMC Avamar Server | =7.2-32-sp1 | |
EMC Avamar Server | =7.2-309 | |
EMC Avamar Server | =7.2-401 | |
EMC Avamar Server | =7.3-125-sp1 | |
EMC Avamar Server | =7.3-211 | |
EMC Avamar Server | =7.3-226 | |
EMC Avamar Server | =7.3-233 | |
EMC Avamar Server | =7.4-58-sp1 | |
EMC Avamar Server | =7.4-242 | |
EMC Avamar Server | =7.5-183 | |
EMC Integrated Data Protection Appliance | =2.0 | |
EMC NetWorker | =9.0 | |
EMC NetWorker | =9.1 | |
EMC NetWorker | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15548 is a vulnerability in EMC Avamar Server, EMC NetWorker Virtual Edition (NVE), and EMC Integrated Data Protection Appliance that allows a remote unauthenticated attacker to bypass authentication and gain unauthorized access.
The severity of CVE-2017-15548 is critical with a CVSS score of 9.8 out of 10.
EMC Avamar Server versions 7.1.x, 7.2.x, 7.3.x, 7.4.x, and 7.5.0 are all affected by CVE-2017-15548.
EMC NetWorker Virtual Edition versions 9.0.x, 9.1.x, and 9.2.x are affected by CVE-2017-15548.
Yes, EMC has released patches and updates to address the vulnerability in affected products. It is recommended to apply the latest security updates to mitigate the risk.