First published: Wed Jan 24 2024(Updated: )
Dell Unity, versions prior to 5.4, contain a vulnerability whereby log messages can be spoofed by an authenticated attacker. An attacker could exploit this vulnerability to forge log entries, create false alarms, and inject malicious content into logs that compromise logs integrity. A malicious attacker could also prevent the product from logging information while malicious actions are performed or implicate an arbitrary user for malicious activities.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Unity Operating Environment | =5.3.0.0.5.120 | |
Dell Unity Xt Operating Environment | =5.3.0.0.5.120 | |
Dell Unityvsa Operating Environment | =5.3.0.0.5.120 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22229 has a medium severity rating, indicating a potential risk to log integrity.
To fix CVE-2024-22229, update your Dell Unity, Unity Xt, or UnityVSA Operating Environment to version 5.4 or later.
CVE-2024-22229 affects Dell Unity, Unity Xt, and UnityVSA Operating Environments prior to version 5.4.
The risks associated with CVE-2024-22229 include forged log entries, false alarms, and potential malicious content injection.
An authenticated attacker can exploit CVE-2024-22229 to manipulate log messages.