Advisory Details

September 15th, 2017

EMC Data Protection Advisor Application Service Static Credentials Authentication Bypass Vulnerability

ZDI-17-811
ZDI-CAN-4699

CVE ID CVE-2017-8013
CVSS SCORE 7.8, AV:N/AC:L/Au:N/C:C/I:N/A:N
AFFECTED VENDORS EMC
AFFECTED PRODUCTS Data Protection Advisor
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['28106']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to escalate privileges on vulnerable installations of EMC Data Protection Advisor. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the EMC DPA Application service, which listens on TCP port 9002 by default. The issue results from hard-coded hidden user entries within the application database. An attacker can leverage this vulnerability to bypass authentication under the context of the Administrator.

ADDITIONAL DETAILS EMC has issued an update to correct this vulnerability. More details can be found at:
http://seclists.org/fulldisclosure/2017/Sep/36
DISCLOSURE TIMELINE
  • 2017-04-12 - Vulnerability reported to vendor
  • 2017-09-15 - Coordinated public release of advisory
CREDIT rgod
BACK TO ADVISORIES