First published: Fri Apr 29 2022(Updated: )
Dell Unity, Dell UnityVSA, and Dell Unity XT versions prior to 5.2.0.0.5.173 contain a plain-text password storage vulnerability when certain off-array tools are run on the system. The credentials of a user with high privileges are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Unity Operating Environment | <5.2.0.0.5.173 | |
Dell Unity Xt Operating Environment | <5.2.0.0.5.173 | |
Dell Unityvsa Operating Environment | <5.2.0.0.5.173 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Dell Unity vulnerability is CVE-2022-29085.
The severity of CVE-2022-29085 is medium with a CVSS score of 6.7.
Dell Unity, Dell UnityVSA, and Dell Unity XT versions prior to 5.2.0.0.5.173 are affected by CVE-2022-29085.
CVE-2022-29085 allows a local malicious user with high privileges to access credentials stored in plain text.
To fix CVE-2022-29085, update Dell Unity, Dell UnityVSA, and Dell Unity XT to version 5.2.0.0.5.173 or higher.