CVE-2019-3753
Severity CVSS v4.0:
Pending analysis
Type:
CWE-522
Insufficiently Protected Credentials
Publication date:
20/08/2019
Last modified:
16/10/2020
Description
Dell EMC PowerConnect 8024, 7000, M6348, M6220, M8024 and M8024-K running firmware versions prior to 5.1.15.2 contain a plain-text password storage vulnerability. TACACS\Radius credentials are stored in plain text in the system settings menu. An authenticated malicious user with access to the system settings menu may obtain the exposed password to use it in further attacks.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dell:emc_powerconnect_8024_firmware:*:*:*:*:*:*:*:* | 5.1.15.2 (excluding) | |
| cpe:2.3:h:dell:emc_powerconnect_8024:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dell:emc_powerconnect_7000_firmware:*:*:*:*:*:*:*:* | 5.1.15.2 (excluding) | |
| cpe:2.3:h:dell:emc_powerconnect_7000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dell:emc_powerconnect_m6348_firmware:*:*:*:*:*:*:*:* | 5.1.15.2 (excluding) | |
| cpe:2.3:h:dell:emc_powerconnect_m6348:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dell:emc_powerconnect_m6220_firmware:*:*:*:*:*:*:*:* | 5.1.15.2 (excluding) | |
| cpe:2.3:h:dell:emc_powerconnect_m6220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dell:emc_powerconnect_m8024_firmware:*:*:*:*:*:*:*:* | 5.1.15.2 (excluding) | |
| cpe:2.3:h:dell:emc_powerconnect_m8024:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dell:emc_powerconnect_m8024-k_firmware:*:*:*:*:*:*:*:* | 5.1.15.2 (excluding) | |
| cpe:2.3:h:dell:emc_powerconnect_m8024-k:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



