Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-5345 : What You Need to Know

Learn about CVE-2020-5345, an authorization bypass vulnerability in Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17. Find out the impact, affected systems, and mitigation steps.

Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an authorization bypass vulnerability that could allow an authenticated malicious user to execute unauthorized commands.

Understanding CVE-2020-5345

This CVE involves an authorization bypass vulnerability in Dell EMC Unisphere for PowerMax and PowerMax OS Release 5978.

What is CVE-2020-5345?

CVE-2020-5345 is an authorization bypass vulnerability in Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, allowing authenticated malicious users to execute unauthorized commands.

The Impact of CVE-2020-5345

The vulnerability has a CVSS base score of 6.4, indicating a medium severity level. An attacker could potentially alter or stop database statistics, impacting the integrity of the system.

Technical Details of CVE-2020-5345

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability allows authenticated malicious users to execute unauthorized commands, potentially affecting database statistics.

Affected Systems and Versions

        Product: Unisphere for PowerMax
        Vendor: Dell
        Versions Affected: Prior to 9.1.0.17

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Network
        Privileges Required: Low
        User Interaction: None
        Scope: Changed
        Confidentiality Impact: None
        Integrity Impact: Low
        Availability Impact: Low

Mitigation and Prevention

To address CVE-2020-5345, follow these mitigation strategies:

Immediate Steps to Take

        Update Dell EMC Unisphere for PowerMax and PowerMax OS to version 9.1.0.17 or higher.
        Monitor and restrict user access to minimize the risk of unauthorized commands.

Long-Term Security Practices

        Regularly review and update access controls and permissions.
        Conduct security training for users to prevent unauthorized actions.

Patching and Updates

        Apply security patches and updates provided by Dell to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now