First published: Tue Jun 08 2021(Updated: )
Dell EMC NetWorker, versions 18.x, 19.1.x, 19.2.x 19.3.x, 19.4, and 19.4.0.1 contain an Improper Certificate Validation vulnerability in the client (NetWorker Management Console) components which uses SSL encrypted connection in order to communicate with the application server. An unauthenticated attacker in the same network collision domain as the NetWorker Management Console client could potentially exploit this vulnerability to perform man-in-the-middle attacks to intercept and tamper the traffic between the client and the application server.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC NetWorker | >=18.1.0.1<19.4.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21559 has a medium severity rating due to improper certificate validation potentially allowing unauthenticated access.
To fix CVE-2021-21559, update your Dell EMC NetWorker to the latest version, specifically to version 19.4.0.2 or higher.
CVE-2021-21559 affects Dell EMC NetWorker versions 18.x and 19.1.x to 19.4.0.1.
CVE-2021-21559 is categorized as an Improper Certificate Validation vulnerability.
Users of Dell EMC NetWorker who are running the affected versions are at risk due to this vulnerability.