Article Number: 000181248
High
Proprietary Code CVE(s) | Description | CVSSBase Score | CVSS Vector String |
CVE-2020-26199 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a plain-text password storage vulnerability. A user credentials (including the Unisphere admin privilege user) password is stored in a plain text in multiple log files. A local authenticated attacker with access to the log files may use the exposed password to gain access with the privileges of the compromised user. |
6.4 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2020-29489 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contains a plain-text password storage vulnerability. A user credentials (including the Unisphere admin privilege user) password is stored in a plain text in a system file. A local authenticated attacker with access to the system files may use the exposed password to gain access with the privileges of the compromised user. | 6.4 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2020-29490 |
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a Denial of Service vulnerability on NAS Servers with NFS exports. A remote authenticated attacker could potentially exploit this vulnerability and cause Denial of Service (Storage Processor Panic) by sending specially crafted UDP requests. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Proprietary Code CVE(s) | Description | CVSSBase Score | CVSS Vector String |
CVE-2020-26199 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a plain-text password storage vulnerability. A user credentials (including the Unisphere admin privilege user) password is stored in a plain text in multiple log files. A local authenticated attacker with access to the log files may use the exposed password to gain access with the privileges of the compromised user. |
6.4 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2020-29489 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contains a plain-text password storage vulnerability. A user credentials (including the Unisphere admin privilege user) password is stored in a plain text in a system file. A local authenticated attacker with access to the system files may use the exposed password to gain access with the privileges of the compromised user. | 6.4 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2020-29490 |
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a Denial of Service vulnerability on NAS Servers with NFS exports. A remote authenticated attacker could potentially exploit this vulnerability and cause Denial of Service (Storage Processor Panic) by sending specially crafted UDP requests. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Product | Affected Version(s) | Updated Version(s) | Link to Update |
Dell EMC Unity Operating Environment (OE) | versions prior to 5.0.4.0.5.012 | 5.0.4.0.5.012 | https://www.dell.com/support/home/en-us/product-support/product/unity-all-flash-family/drivers |
Dell EMC Unity XT Operating Environment (OE) | versions prior to 5.0.4.0.5.012 | 5.0.4.0.5.012 | |
Dell EMC Unity VSA Operating Environment (OE) | versions prior to 5.0.4.0.5.012 | 5.0.4.0.5.012 |
Product | Affected Version(s) | Updated Version(s) | Link to Update |
Dell EMC Unity Operating Environment (OE) | versions prior to 5.0.4.0.5.012 | 5.0.4.0.5.012 | https://www.dell.com/support/home/en-us/product-support/product/unity-all-flash-family/drivers |
Dell EMC Unity XT Operating Environment (OE) | versions prior to 5.0.4.0.5.012 | 5.0.4.0.5.012 | |
Dell EMC Unity VSA Operating Environment (OE) | versions prior to 5.0.4.0.5.012 | 5.0.4.0.5.012 |
None
Revision | Date | Description |
1.0 | 2020-12-17 | Initial Release |
Dell EMC Unity, Dell EMC Unity XT 380, Dell EMC Unity XT 380F, Dell EMC Unity XT 480, Dell EMC Unity XT 480F, Dell EMC Unity XT 680, Dell EMC Unity XT 680F, Dell EMC Unity XT 880, Dell EMC Unity XT 880F, Dell EMC Unity Family, UnityVSA
17 Dec 2020
Dell Security Advisory