First published: Mon Jun 19 2017(Updated: )
In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, an unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system, aka remote code execution.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC VNX2 OE Firmware | ||
EMC VNX2 OE Firmware | ||
EMC VNX1 Firmware | ||
EMC VNX1 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4984 is considered a high-severity vulnerability due to its potential for unauthorized root access.
To mitigate CVE-2017-4984, update EMC VNX2 firmware to versions OE for File 8.1.9.211 or later, or VNX1 firmware to OE for File 7.1.80.8 or later.
CVE-2017-4984 affects users of EMC VNX2 and EMC VNX1 systems with specific outdated firmware versions.
CVE-2017-4984 enables unauthenticated remote attackers to execute arbitrary commands with root privileges.
While the specific activity regarding exploitation of CVE-2017-4984 may vary, it is classified as a serious risk and should be addressed promptly.