First published: Tue Nov 23 2021(Updated: )
Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Cloud Link | <7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36313 has been assigned a high severity rating due to its potential for remote exploitation.
To fix CVE-2021-36313, upgrade Dell EMC CloudLink to version 7.1.2 or higher, which addresses this vulnerability.
CVE-2021-36313 affects Dell EMC CloudLink version 7.1 and all prior versions.
CVE-2021-36313 enables remote attackers to execute arbitrary OS commands on the underlying operating system.
High privileged attackers are primarily at risk from exploiting CVE-2021-36313 due to the nature of the vulnerability.