|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
EMC VNX: two vulnerabilities
Synthesis of the vulnerability
An attacker can use several vulnerabilities of EMC VNX.
Impacted products: VNX Operating Environment, VNX Series.
Severity of this bulletin: 2/4.
Consequences of an intrusion: data reading, denial of service on service.
Hacker's origin: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 21/09/2017.
Références of this threat: CVE-2017-8007, CVE-2017-8012, ESA-2017-081, VIGILANCE-VUL-23901, ZDI-17-826, ZDI-17-827.
Description of the vulnerability
Several vulnerabilities were announced in EMC VNX.
An attacker can traverse directories, in order to read a file outside the root path. [severity:2/4; CVE-2017-8007, ZDI-17-827]
An attacker can trigger a fatal error via JMX, in order to trigger a denial of service. [severity:2/4; CVE-2017-8012, ZDI-17-826]
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a networks vulnerabilities announce. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The technology watch team tracks security threats targeting the computer system.