Vulnerability Description
In EMC Avamar Server Software 7.3.1-125, 7.3.0-233, 7.3.0-226, 7.2.1-32, 7.2.1-31, 7.2.0-401, an unauthenticated remote attacker may potentially bypass the authentication process to gain access to the system maintenance page. This may be exploited by an attacker to view sensitive information, perform software updates, or run maintenance workflows.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emc | Avamar Server | 7.2.0-401 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/540754/30/0/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/99243Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038718
- http://www.securityfocus.com/archive/1/540754/30/0/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/99243Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038718
FAQ
What is CVE-2017-4989?
CVE-2017-4989 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In EMC Avamar Server Software 7.3.1-125, 7.3.0-233, 7.3.0-226, 7.2.1-32, 7.2.1-31, 7.2.0-401, an unauthenticated remote attacker may potentially bypass the authentication process to gain access to the...
How severe is CVE-2017-4989?
CVE-2017-4989 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-4989?
Check the references section above for vendor advisories and patch information. Affected products include: Emc Avamar Server.