DSA-2024-492 : Security Update Dell VxVerify on VxRail Plaintext Password Storage Vulnerabilities
Summary: Dell VxVerify on VxRail remediation is available plaintext password storage vulnerability that could be exploited by malicious users to compromise the affected system.
Impact
High
Details
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|
CVE-2024-53292 |
Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account. |
7.2 |
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|
CVE-2024-53292 |
Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account. |
7.2 |
Affected Products & Remediation
|
CVEs Addressed |
Product |
Software/Firmware |
Affected Versions |
Remediated Version |
Link |
|
CVE-2024-53292 |
VxRail |
VxVerify |
Versions prior to x.40.405 |
Version x.40.405 or later |
|
CVEs Addressed |
Product |
Software/Firmware |
Affected Versions |
Remediated Version |
Link |
|
CVE-2024-53292 |
VxRail |
VxVerify |
Versions prior to x.40.405 |
Version x.40.405 or later |
VxVerify x.40.405 was released on April 5, 2024. Dell recommends leveraging the latest version of VxVerify.
Revision History
|
Revision |
Date |
Description |
|
1.0 |
2024-12-11 |
Initial Release |
|
2.0 |
2025-01-16 |
Updating the advisory to extend our gratitude to Klaas Demter for reporting this issue. |
Acknowledgements
Dell Technologies would like to thank Klaas Demter for reporting this issue.