First published: Thu Sep 01 2022(Updated: )
Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially access and interact with the docker registry API leading to an authentication bypass. The attacker may potentially alter the docker images leading to a loss of integrity and confidentiality
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell PowerProtect | <19.11.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34372 is classified as a critical authentication bypass vulnerability affecting Dell PowerProtect Cyber Recovery.
To fix CVE-2022-34372, upgrade Dell PowerProtect Cyber Recovery to version 19.11.0.2 or later.
An attacker can execute remote unauthenticated access to the Docker registry API, potentially allowing them to alter Docker images.
All versions of Dell PowerProtect Cyber Recovery prior to 19.11.0.2 are affected by CVE-2022-34372.
No, CVE-2022-34372 can be exploited by remote unauthenticated attackers.