Dell EMC ScaleIO 2.0.1.0

CPE Details

Dell EMC ScaleIO 2.0.1.0
2.0.1.0
2019-11-13
13h34 +00:00
2019-11-13
13h34 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:dell:emc_scaleio:2.0.1.0:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

emc_scaleio

Version

2.0.1.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2018-1205 2018-03-27 21h00 +00:00 Dell EMC ScaleIO, versions prior to 2.5, do not properly handle some packet data in the MDM service. As a result, a remote attacker could potentially send specifically crafted packet data to the MDM service causing it to crash.
7.5
High
CVE-2018-1237 2018-03-27 21h00 +00:00 Dell EMC ScaleIO versions prior to 2.5, contain improper restriction of excessive authentication attempts on the Light installation Agent (LIA). This component is deployed on every server in the ScaleIO cluster and is used for central management of ScaleIO nodes. A remote malicious user, having network access to LIA, could potentially exploit this vulnerability to launch brute force guessing of user names and passwords of user accounts on the LIA.
9.8
Critical
CVE-2018-1238 2018-03-27 21h00 +00:00 Dell EMC ScaleIO versions prior to 2.5, contain a command injection vulnerability in the Light Installation Agent (LIA). This component is used for central management of ScaleIO deployment and uses shell commands for certain actions. A remote malicious user, with network access to LIA and knowledge of the LIA administrative password, could potentially exploit this vulnerability to run arbitrary commands as root on the systems where LIAs are installed.
7.5
High
CVE-2017-8001 2017-11-28 06h00 +00:00 An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.
8.4
High