First published: Thu Jun 27 2019(Updated: )
Dell EMC Unity and UnityVSA versions prior to 5.0.0.0.5.116 contain a plain-text password storage vulnerability. A Unisphere user’s (including the admin privilege user) password is stored in a plain text in Unity Data Collection bundle (logs files for troubleshooting). A local authenticated attacker with access to the Data Collection bundle may use the exposed password to gain access with the privileges of the compromised user.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Unity Operating Environment | <5.0.0.0.5.116 | |
Dell Emc Unityvsa Operating Environment | <5.0.0.0.5.116 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-3741 is high.
Dell EMC Unity and UnityVSA versions prior to 5.0.0.0.5.116 are affected by CVE-2019-3741.
CVE-2019-3741 exploits the plain-text password storage vulnerability in Dell EMC Unity and UnityVSA.
The CWE category of CVE-2019-3741 is CWE-693 (Protection Mechanism Failure).
To fix CVE-2019-3741, update Dell EMC Unity and UnityVSA to version 5.0.0.0.5.116 or later.