First published: Fri Sep 22 2017(Updated: )
In EMC ViPR SRM, Storage M&R, VNX M&R, and M&R (Watch4Net) for SAS Solution Packs, the Webservice Gateway is affected by a directory traversal vulnerability. Attackers with knowledge of Webservice Gateway credentials could potentially exploit this vulnerability to access unauthorized information, and modify or delete data, by supplying specially crafted strings in input parameters of the web service call.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC M&R | ||
Dell EMC VNX Monitoring And Reporting | ||
Dell EMC ViPR SRM | <=4.0.2 | |
Dell EMC VNX Monitoring And Reporting |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8007 is considered a high severity vulnerability due to its potential for unauthorized information access.
To remediate CVE-2017-8007, you should update the affected software to the latest patched version provided by Dell EMC.
CVE-2017-8007 affects various Dell EMC products, including ViPR SRM, Storage Monitoring and Reporting, VNX Monitoring and Reporting, and M&R (Watch4Net) for SAS Solution Packs.
Yes, CVE-2017-8007 can potentially be exploited remotely by attackers with access to the Webservice Gateway credentials.
CVE-2017-8007 is classified as a directory traversal vulnerability that allows unauthorized access to sensitive information.