CVE-2024-53292

Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dell:vxrail_hyperconverged_infrastructure:*:*:*:*:*:*:*:*

History

04 Feb 2025, 16:16

Type Values Removed Values Added
References () https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities - () https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities - Vendor Advisory
CWE CWE-256 CWE-522
First Time Dell
Dell vxrail Hyperconverged Infrastructure
CPE cpe:2.3:a:dell:vxrail_hyperconverged_infrastructure:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7

11 Dec 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-11 08:15

Updated : 2025-02-04 16:16


NVD link : CVE-2024-53292

Mitre link : CVE-2024-53292


JSON object : View

Products Affected

dell

  • vxrail_hyperconverged_infrastructure
CWE
CWE-522

Insufficiently Protected Credentials