Vulnerability Description
Dell Data Protection Search 19.2.0 and above contain an exposed password opportunity in plain text when using LdapSettings.get_ldap_info in DP Search. A remote unauthorized unauthenticated attacker could potentially exploit this vulnerability leading to a loss of Confidentiality, Integrity, Protection, and remote takeover of the system. This is a high-severity vulnerability as it allows an attacker to take complete control of DP Search to affect downstream protected devices.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dell | Data Protection Search | >= 19.2.0, < 19.6.4 |
Related Weaknesses (CWE)
References
- https://www.dell.com/support/kbdoc/en-us/000221720/dsa-2024-063-security-update-PatchVendor Advisory
- https://www.dell.com/support/kbdoc/en-us/000221720/dsa-2024-063-security-update-PatchVendor Advisory
FAQ
What is CVE-2024-22433?
CVE-2024-22433 is a vulnerability with a CVSS score of 8.8 (HIGH). Dell Data Protection Search 19.2.0 and above contain an exposed password opportunity in plain text when using LdapSettings.get_ldap_info in DP Search. A remote unauthorized unauthenticated attacker c...
How severe is CVE-2024-22433?
CVE-2024-22433 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-22433?
Check the references section above for vendor advisories and patch information. Affected products include: Dell Data Protection Search.