Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-1183
Analyzed
More InfoOfficial Page
Source-security_alert@emc.com
View Known Exploited Vulnerability (KEV) details
Published At-30 Apr, 2018 | 20:29
Updated At-13 Jun, 2018 | 12:09

In Dell EMC Unisphere for VMAX Virtual Appliance versions prior to 8.4.0.8, Dell EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.8, Dell EMC VASA Provider Virtual Appliance versions prior to 8.4.0.512, Dell EMC SMIS versions prior to 8.4.0.6, Dell EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4.0.347, Dell EMC VNX2 Operating Environment (OE) for File versions prior to 8.1.9.231, Dell EMC VNX2 Operating Environment (OE) for Block versions prior to 05.33.009.5.231, Dell EMC VNX1 Operating Environment (OE) for File versions prior to 7.1.82.0, Dell EMC VNX1 Operating Environment (OE) for Block versions prior to 05.32.000.5.225, Dell EMC VNXe3200 Operating Environment (OE) all versions, Dell EMC VNXe1600 Operating Environment (OE) versions prior to 3.1.9.9570228, Dell EMC VNXe 3100/3150/3300 Operating Environment (OE) all versions, Dell EMC ViPR SRM versions 3.7, 3.7.1, 3.7.2 (only if using Dell EMC Host Interface for Windows), Dell EMC ViPR SRM versions 4.0, 4.0.1, 4.0.2, 4.0.3 (only if using Dell EMC Host Interface for Windows), Dell EMC XtremIO versions 4.x, Dell EMC VMAX eNAS version 8.x, Dell EMC Unity Operating Environment (OE) versions prior to 4.3.0.1522077968, ECOM is affected by a XXE injection vulnerability due to the configuration of the XML parser shipped with the product. XXE Injection attack may occur when XML input containing a reference to an external entity (defined by the attacker) is processed by an affected XML parser. XXE Injection may allow attackers to gain unauthorized access to files containing sensitive information or may be used to cause denial-of-service.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Dell Inc.
dell
>>emc_smis>>Versions before 8.4.0.6(exclusive)
cpe:2.3:a:dell:emc_smis:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_solutions_enabler_virtual_appliance>>Versions before 8.4.0.8(exclusive)
cpe:2.3:a:dell:emc_solutions_enabler_virtual_appliance:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_unisphere>>Versions before 8.4.0.8(exclusive)
cpe:2.3:a:dell:emc_unisphere:*:*:*:*:*:vmax_virtual_appliance:*:*
Dell Inc.
dell
>>emc_unity_operating_environment>>Versions before 4.3.0.1522077968(exclusive)
cpe:2.3:a:dell:emc_unity_operating_environment:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vasa_provider_virtual_appliance>>Versions before 8.4.0.512(exclusive)
cpe:2.3:a:dell:emc_vasa_provider_virtual_appliance:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vipr_srm>>-
cpe:2.3:a:dell:emc_vipr_srm:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vipr_srm>>3.7
cpe:2.3:a:dell:emc_vipr_srm:3.7:*:*:*:*:windows:*:*
Dell Inc.
dell
>>emc_vipr_srm>>3.7.1
cpe:2.3:a:dell:emc_vipr_srm:3.7.1:*:*:*:*:windows:*:*
Dell Inc.
dell
>>emc_vipr_srm>>3.7.2
cpe:2.3:a:dell:emc_vipr_srm:3.7.2:*:*:*:*:windows:*:*
Dell Inc.
dell
>>emc_vipr_srm>>4.0
cpe:2.3:a:dell:emc_vipr_srm:4.0:*:*:*:*:windows:*:*
Dell Inc.
dell
>>emc_vipr_srm>>4.0.1
cpe:2.3:a:dell:emc_vipr_srm:4.0.1:*:*:*:*:windows:*:*
Dell Inc.
dell
>>emc_vipr_srm>>4.0.2
cpe:2.3:a:dell:emc_vipr_srm:4.0.2:*:*:*:*:windows:*:*
Dell Inc.
dell
>>emc_vipr_srm>>4.0.3
cpe:2.3:a:dell:emc_vipr_srm:4.0.3:*:*:*:*:windows:*:*
Dell Inc.
dell
>>emc_vmax_embedded_management>>Versions up to 1.4.0.347(inclusive)
cpe:2.3:a:dell:emc_vmax_embedded_management:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vmax_enas>>8.0
cpe:2.3:a:dell:emc_vmax_enas:8.0:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vmax_enas>>8.0.1
cpe:2.3:a:dell:emc_vmax_enas:8.0.1:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vnx1_operating_environment>>05.32.000.5.225
cpe:2.3:a:dell:emc_vnx1_operating_environment:05.32.000.5.225:*:*:*:*:block:*:*
Dell Inc.
dell
>>emc_vnx1_operating_environment>>7.1.82.0
cpe:2.3:a:dell:emc_vnx1_operating_environment:7.1.82.0:*:*:*:*:file:*:*
Dell Inc.
dell
>>emc_vnx2_operating_environment>>Versions before 05.33.009.5.231(exclusive)
cpe:2.3:a:dell:emc_vnx2_operating_environment:*:*:*:*:*:block:*:*
Dell Inc.
dell
>>emc_vnx2_operating_environment>>Versions before 8.1.9.231(exclusive)
cpe:2.3:a:dell:emc_vnx2_operating_environment:*:*:*:*:*:file:*:*
Dell Inc.
dell
>>emc_vnxe_3100_operating_environment>>-
cpe:2.3:a:dell:emc_vnxe_3100_operating_environment:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vnxe_3150_operating_environment>>-
cpe:2.3:a:dell:emc_vnxe_3150_operating_environment:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vnxe_3300__operating_environment>>-
cpe:2.3:a:dell:emc_vnxe_3300__operating_environment:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vnxe1600_operating_environment>>Versions before 3.1.9.9570228(exclusive)
cpe:2.3:a:dell:emc_vnxe1600_operating_environment:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_vnxe3200_operating_environment>>-
cpe:2.3:a:dell:emc_vnxe3200_operating_environment:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_xtremio>>4.0
cpe:2.3:a:dell:emc_xtremio:4.0:*:*:*:*:*:*:*
Dell Inc.
dell
>>emc_xtremio>>4.0.2
cpe:2.3:a:dell:emc_xtremio:4.0.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-611Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://seclists.org/fulldisclosure/2018/Apr/61security_alert@emc.com
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/104024security_alert@emc.com
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found