Learn about CVE-2021-36349 affecting Dell EMC Data Protection Central versions 19.5 and earlier. Understand the impact, technical details, and mitigation steps for this Server Side Request Forgery (SSRF) vulnerability.
Dell EMC Data Protection Central versions 19.5 and earlier have a Server Side Request Forgery (SSRF) vulnerability in the DPC DNS client processing. This could be exploited by a remote attacker to perform port scanning on external hosts.
Understanding CVE-2021-36349
This section focuses on the impact and technical details of the CVE.
What is CVE-2021-36349?
The CVE-2021-36349 vulnerability exists in Dell EMC Data Protection Central versions 19.5 and below, allowing a malicious remote user to conduct port scanning on external hosts.
The Impact of CVE-2021-36349
The impact of this vulnerability is rated as medium severity with a CVSS base score of 4.3. It has a low confidentiality impact and low privileges are required to exploit it.
Technical Details of CVE-2021-36349
Detailed information about the vulnerability is provided in this section.
Vulnerability Description
The vulnerability arises due to a Server Side Request Forgery (SSRF) issue in the DPC DNS client processing in Dell EMC Data Protection Central.
Affected Systems and Versions
Dell EMC Data Protection Central versions 19.5 and previous are affected by this vulnerability.
Exploitation Mechanism
A remote malicious user can exploit this vulnerability to enable port scanning of external hosts.
Mitigation and Prevention
This section discusses steps to mitigate and prevent exploitation of the CVE.
Immediate Steps to Take
Users are advised to update Dell EMC Data Protection Central to version 19.6 or higher to prevent exploitation.
Long-Term Security Practices
In addition to patching software, implementing network security measures can help prevent similar vulnerabilities.
Patching and Updates
Regularly applying security patches and updates for Dell EMC Data Protection Central is crucial to address known vulnerabilities.