|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
EMC VNX: two vulnerabilities
Synthesis of the vulnerability
An attacker can use several vulnerabilities of EMC VNX.
Impacted products: VNX Operating Environment, VNX Series.
Consequences: data reading, denial of service on service.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 21/09/2017.
Identifiers: CVE-2017-8007, CVE-2017-8012, ESA-2017-081, VIGILANCE-VUL-23901, ZDI-17-826, ZDI-17-827.
Description of the vulnerability
Several vulnerabilities were announced in EMC VNX.
An attacker can traverse directories, in order to read a file outside the root path. [severity:2/4; CVE-2017-8007, ZDI-17-827]
An attacker can trigger a fatal error via JMX, in order to trigger a denial of service. [severity:2/4; CVE-2017-8012, ZDI-17-826]
Complete Vigil@nce bulletin.... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a networks vulnerabilities announce. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The technology watch team tracks security threats targeting the computer system.