First published: Fri Dec 13 2024(Updated: )
Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RecoverPoint | >=6.0.0 | |
EMC RecoverPoint | =6.0-sp1 | |
EMC RecoverPoint | =6.0-sp1_p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-48007 is considered high due to the use of hard-coded credentials that can be exploited by unauthenticated attackers.
To mitigate CVE-2024-48007, update Dell RecoverPoint for Virtual Machines to the latest version as recommended by Dell.
CVE-2024-48007 affects versions 6.0.0 and above of Dell RecoverPoint for Virtual Machines.
Yes, CVE-2024-48007 can be exploited remotely by an unauthenticated attacker.
The impact of CVE-2024-48007 includes the potential for unauthorized access to the system due to hard-coded credentials.