Description
Dell EMC Enterprise Copy Data Management (eCDM) versions 1.0, 1.1, 2.0, 2.1, and 3.0 contain a certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim’s data in transit.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
The following Dell EMC PowerProtect Data Manager (formerly named Dell EMC Enterprise Copy Data Management) release addresses this vulnerabily: Dell EMC PowerProtect Data Manager version 19.1 or later
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13386 | Dell EMC Enterprise Copy Data Management (eCDM) versions 1.0, 1.1, 2.0, 2.1, and 3.0 contain a certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim’s data in transit. |
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-17T02:47:44.353Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3751
No data.
Status : Modified
Published: 2019-09-03T17:15:11.210
Modified: 2024-11-21T04:42:27.793
Link: CVE-2019-3751
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD