Learn about CVE-2020-26199 affecting Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012. Discover the impact, affected systems, and mitigation steps.
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 have a plain-text password storage vulnerability that exposes user credentials, including the Unisphere admin privilege user, in log files. An authenticated local attacker can exploit this to gain unauthorized access.
Understanding CVE-2020-26199
This CVE involves a security issue in Dell EMC Unity, Unity XT, and UnityVSA versions before 5.0.4.0.5.012, allowing attackers to access plain-text passwords stored in log files.
What is CVE-2020-26199?
CVE-2020-26199 is a vulnerability in Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012, where user passwords, including the Unisphere admin privilege user, are stored in plain text in log files.
The Impact of CVE-2020-26199
The vulnerability has a CVSS base score of 6.4 (Medium severity) with high impacts on confidentiality, integrity, and availability. An attacker with local access to log files can exploit this to gain unauthorized access with compromised user privileges.
Technical Details of CVE-2020-26199
This section provides detailed technical information about the CVE.
Vulnerability Description
The vulnerability involves plain-text storage of user passwords, including the Unisphere admin privilege user, in log files of affected Dell EMC Unity products.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect your systems from CVE-2020-26199 with these mitigation strategies.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates