First published: Wed Feb 01 2023(Updated: )
Dell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Emc Data Domain Os | <6.2.1.90 | |
Dell Emc Data Domain Os | >=7.0.0.0<7.9.0.0 | |
Dell Emc Data Domain Os | >=7.7.1<7.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Dell EMC vulnerability is CVE-2023-23692.
The severity of the Dell EMC vulnerability CVE-2023-23692 is high with a severity value of 8.8.
The affected software for CVE-2023-23692 is Dell EMC Data Domain OS versions up to 6.2.1.90, versions between 7.0.0.0 and 7.9.0.0, and versions between 7.7.1 and 7.7.3.
The Dell EMC vulnerability CVE-2023-23692 allows an authenticated non admin attacker to execute arbitrary OS commands on the application's underlying OS.
To fix the Dell EMC vulnerability CVE-2023-23692, apply the security update provided by Dell Technologies. More information can be found at the following link: <a href="https://www.dell.com/support/kbdoc/en-us/000201296/dsa-2022-187-dell-technologies-powerprotect-data-domain-security-update-for-multiple-third-party-component-vulnerabilities">https://www.dell.com/support/kbdoc/en-us/000201296/dsa-2022-187-dell-technologies-powerprotect-data-domain-security-update-for-multiple-third-party-component-vulnerabilities</a>.