Dell Encryption and Dell Endpoint Security Suite Enterprise Security Policy Overwrite Vulnerability

Dell Encryption and Dell Endpoint Security Suite Enterprise Security Policy Overwrite Vulnerability


CVE Identifier: CVE-2018-15766

Severity: Medium

Note: For more information on CVE Identifiers, reference https://www.cvedetails.com/cve-help.php External Link .

Affected Products:

Dell Encryption Enterprise - all versions v8.4.0 and 10.0
Dell Endpoint Security Suite Enterprise - all versions v1.0.0 and 2.0


Summary:

Dell Encryption 10.0.1 and Dell Endpoint Security Suite Enterprise 2.0.1 contain fixes for a security policy override vulnerability that could potentially be exploited by malicious users to compromise the affected system.

Details:

On install, Dell Encryption versions prior 10.0.1 and Dell Endpoint Security Suite Enterprise versions prior 2.0.1 will overwrite and manually set the "Minimum Password Length" group policy object to a value of 1 on that device. This allows for users to bypass any existing policy for password length and potentially create insecure password on their device.

This value is defined during the installation of the "Encryption Management Agent" or "EMAgent" application. There are no other known values modified.



Resolution:

The following Dell Data Security releases contain resolutions to this vulnerability:

  • Dell Encryption version 10.0.1 and later
  • Dell Endpoint Security Suite Enterprise version 2.0.1 and later

Dell recommends all customers upgrade at the earliest opportunity.

Workaround:

For affected devices, the minimum password length policy should be changed manually to what is desired for the current environment.

  • If Dell Endpoint Security Suite Enterprise or Dell Encryption Enterprise’s Encryption Management Agent is installed on a Domain Controller or a device that is not joined to a domain, the default minimum password length will need to be changed on the local device.
  • If Dell Endpoint Security Suite Enterprise or Dell Encryption Enterprise’s Encryption Management Agent is installed on a device that is joined to a domain, the default minimum password length will need to be changed within the enterprise’s Group Policy Management console.

Default values for this property is ‘7’ in most configurations.

This Microsoft KB article outlines how to modify this setting:
https://technet.microsoft.com/en-us/library/dd277399.aspx External Link

Link to remedies:

Customers can download Dell Encryption software from https://www.dell.com/support/home/us/en/04/product-support/product/dell-data-protection-encryption/drivers.

Dell Endpoint Security Suite Enterprise software will be made available to customers on their ddpe.credant.com accounts, or can be obtained through Dell ProSupport.

Dell recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.


For support, US-based customers may contact Dell Data Security ProSupport at 877.459.7304, Option 1, Ext. 4310039, or via the Chat Portal. To contact support outside the US, reference ProSupport’s International Contact Numbers. For additional insights and resources, visit the Dell Security Community Forum.


Article ID: SLN313561

Last Date Modified: 10/18/2018 10:05 AM


Rate this article

Accurate
Useful
Easy to understand
Was this article helpful?
Yes No
Send us feedback
Comments cannot contain these special characters: <>()\
Sorry, our feedback system is currently down. Please try again later.

Thank you for your feedback.