Description
Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
Published: 2021-12-21
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-30502 Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
History

No history.

Subscriptions

Dell Powerpath Management Appliance
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-09-17T03:44:02.072Z

Reserved: 2021-11-12T00:00:00.000Z

Link: CVE-2021-43587

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-21T17:15:08.357

Modified: 2024-11-21T06:29:29.623

Link: CVE-2021-43587

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses