First published: Fri Mar 23 2018(Updated: )
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a path traversal vulnerability in its Web server's URI parser which could be used to obtain specific sensitive data without authentication. A remote unauthenticated attacker may be able to read configuration settings from the iDRAC by querying specific URI strings.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell iDRAC7 Firmware | <2.52.52.52 | |
Dell iDRAC8 | <2.52.52.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1211 is classified as a high severity vulnerability due to its potential for unauthorized data access.
To mitigate CVE-2018-1211, upgrade Dell EMC iDRAC7/iDRAC8 to version 2.52.52.52 or later.
CVE-2018-1211 allows remote unauthenticated attackers to access sensitive configuration settings.
CVE-2018-1211 affects Dell EMC iDRAC7 and iDRAC8 versions prior to 2.52.52.52.
No, CVE-2018-1211 can be exploited by remote attackers without authentication.