First published: Fri Feb 16 2024(Updated: )
Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains a brute force/dictionary attack vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to launch a brute force attack or a dictionary attack against the RecoverPoint login form. This allows attackers to brute-force the password of valid users in an automated manner.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RecoverPoint | >=5.3.0<6.1.0 | |
EMC RecoverPoint | =5.3-sp2 | |
EMC RecoverPoint | =5.3-sp2_p1 | |
EMC RecoverPoint | =5.3-sp2_p2 | |
EMC RecoverPoint | =5.3-sp2_p4 | |
EMC RecoverPoint | =5.3-sp3_p1 | |
EMC RecoverPoint | =5.3-sp3_p2 | |
EMC RecoverPoint | =6.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22425 is classified as a moderate severity vulnerability.
To fix CVE-2024-22425, update Dell RecoverPoint for Virtual Machines to the latest version provided by Dell.
CVE-2024-22425 affects users of Dell RecoverPoint for Virtual Machines versions 5.3.x and 6.0.SP1.
CVE-2024-22425 allows unauthenticated remote attackers to conduct brute force and dictionary attacks against the RecoverPoint login form.
No, CVE-2024-22425 can be exploited by unauthenticated attackers.