CVE-2019-3762
18.03.2020, 19:15
Data Protection Central versions 1.0, 1.0.1, 18.1, 18.2, and 19.1 contains an Improper Certificate Chain of Trust Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by obtaining a CA signed certificate from Data Protection Central to impersonate a valid system to compromise the integrity of data.Enginsight
Vendor | Product | Version |
---|---|---|
dell | emc_data_protection_central | 1.0 |
dell | emc_data_protection_central | 1.0.1 |
dell | emc_data_protection_central | 18.1 |
dell | emc_data_protection_central | 18.2 |
dell | emc_data_protection_central | 19.1 |
dell | emc_integrated_data_protection_appliance | 2.0 |
dell | emc_integrated_data_protection_appliance | 2.1 |
dell | emc_integrated_data_protection_appliance | 2.2 |
dell | emc_integrated_data_protection_appliance | 2.3 |
dell | emc_integrated_data_protection_appliance | 2.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-296 - Improper Following of a Certificate's Chain of TrustThe software does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate.
- CWE-295 - Improper Certificate ValidationThe software does not validate, or incorrectly validates, a certificate.