First published: Mon Jun 19 2017(Updated: )
In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user can load a maliciously crafted file in the search path which may potentially allow the attacker to execute arbitrary code on the targeted VNX Control Station system, aka an uncontrolled search path vulnerability.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC VNX2 Firmware | ||
Dell EMC VNX2 | ||
EMC VNX1 OE Firmware | ||
EMC VNX1 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4987 has been classified as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2017-4987, update the EMC VNX2 to OE for File version 8.1.9.211 or later, or the VNX1 to version 7.1.80.8 or later.
CVE-2017-4987 affects EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8.
No, CVE-2017-4987 requires local authenticated access to exploit the vulnerability.
Local authenticated users of vulnerable EMC VNX systems are at risk of exploitation from CVE-2017-4987.