First published: Thu Dec 17 2020(Updated: )
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contains a plain-text password storage vulnerability. A user credentials (including the Unisphere admin privilege user) password is stored in a plain text in a system file. A local authenticated attacker with access to the system files may use the exposed password to gain access with the privileges of the compromised user.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Unity XT Operating Environment | <5.0.4.0.5.012 | |
Dell EMC UnityVSA Operating Environment | <5.0.4.0.5.012 | |
Dell EMC Unity XT Operating Environment | <5.0.4.0.5.012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29489 has a moderate severity due to the risks associated with plain-text password storage that can be exploited by local authenticated attackers.
To fix CVE-2020-29489, upgrade to Dell EMC Unity, Unity XT, or UnityVSA versions 5.0.4.0.5.012 or later.
The implications of CVE-2020-29489 include potential unauthorized access to sensitive user credentials, which may lead to further system compromise.
CVE-2020-29489 affects Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012.
CVE-2020-29489 can be exploited by local authenticated attackers with access to the affected Dell EMC systems.