First published: Fri Sep 22 2017(Updated: )
In EMC ViPR SRM, Storage M&R, VNX M&R, and M&R (Watch4Net) for SAS Solution Packs, the Java Management Extensions (JMX) protocol used to communicate between components in the Alerting and/or Compliance components can be leveraged to create a denial of service (DoS) condition. Attackers with knowledge of JMX agent user credentials could potentially exploit this vulnerability to create arbitrary files on the affected system and create a DoS condition by leveraging inherent JMX protocol capabilities.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC M&R | ||
Dell EMC VNX Monitoring And Reporting | ||
Dell EMC ViPR SRM | <=4.0.2 | |
Dell EMC VNX Monitoring And Reporting |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8012 has been classified as a high severity vulnerability due to its potential to cause denial of service conditions.
Mitigation for CVE-2017-8012 involves restricting access to JMX endpoints and implementing proper network security measures.
CVE-2017-8012 affects Dell EMC ViPR SRM versions up to 4.0.2, as well as various EMC M&R and SAS Solution Packs.
CVE-2017-8012 can be exploited to launch a denial of service attack through the Java Management Extensions protocol.
CVE-2017-8012 can become a persistent threat if the vulnerability is not patched or mitigated, leading to ongoing service disruptions.