First published: Mon Jul 19 2021(Updated: )
Dell EMC Networking S4100 and S5200 Series Switches manufactured prior to February 2020 contain a hardcoded credential vulnerability. A remote unauthenticated malicious user could exploit this vulnerability and gain administrative privileges.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC PowerSwitch S4112F-ON | ||
Dell EMC PowerSwitch S4112T-ON | ||
Dell EMC PowerSwitch S4128F-ON | ||
Dell EMC PowerSwitch S4128T-ON | ||
Dell EMC PowerSwitch S4148F-ON | ||
Dell EMC PowerSwitch S4148FE-ON | ||
Dell EMC PowerSwitch S4148T-ON | ||
Dell EMC PowerSwitch S4148U-ON | ||
Dell EMC PowerSwitch S5212F-ON | ||
Dell EMC PowerSwitch S5224F-ON | ||
Dell EMC PowerSwitch S5232F-ON | ||
Dell EMC PowerSwitch S5248F-ON | ||
Dell EMC PowerSwitch S5296F-ON |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5349 is rated as a high-severity vulnerability that can allow unauthorized administrative access.
To mitigate CVE-2020-5349, users should upgrade their Dell EMC Networking devices to the latest patched firmware versions.
CVE-2020-5349 affects various Dell EMC PowerSwitch models, including S4100 and S5200 series switches manufactured prior to February 2020.
Yes, CVE-2020-5349 can be exploited by remote unauthenticated attackers without requiring physical access to the network devices.
Exploitation of CVE-2020-5349 may allow attackers to gain administrative privileges, potentially leading to unauthorized control over the network infrastructure.