First published: Fri Dec 13 2024(Updated: )
Dell RecoverPoint for VMs, version(s) 6.0.x contain(s) a Use of a Broken or Risky Cryptographic Algorithm vulnerability in the SSH. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Remote execution.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC RecoverPoint | >=6.0.0 | |
EMC RecoverPoint | =6.0-sp1 | |
EMC RecoverPoint | =6.0-sp1_p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28980 is considered a critical vulnerability due to its potential for remote code execution by unauthenticated attackers.
To resolve CVE-2024-28980, you should update Dell RecoverPoint for VMs to the latest version or apply the recommended security patches.
CVE-2024-28980 affects users of Dell RecoverPoint for VMs versions 6.0.x, including 6.0-sp1 and 6.0-sp1_p1.
CVE-2024-28980 can be exploited by unauthenticated remote attackers to gain unauthorized access and potentially execute arbitrary code.
CVE-2024-28980 involves a use of a broken or risky cryptographic algorithm vulnerability specifically associated with the SSH component.