First published: Tue Nov 28 2017(Updated: )
An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC ScaleIO | =2.0.1.0 | |
Dell EMC ScaleIO | =2.0.1.1 | |
Dell EMC ScaleIO | =2.0.1.2 | |
Dell EMC ScaleIO | =2.0.1.3 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8001 is considered a moderate severity vulnerability due to the exposure of sensitive credentials.
To fix CVE-2017-8001, ensure that the support scripts do not save credentials in clear text and apply the latest patches from Dell EMC.
CVE-2017-8001 affects Dell EMC ScaleIO versions 2.0.1.0, 2.0.1.1, 2.0.1.2, and 2.0.1.3.
CVE-2017-8001 can potentially be exploited by any unprivileged user who has access to the server in a Linux environment.
CVE-2017-8001 exposes the credentials of the ScaleIO MDM user in clear text within temporary log files.