Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:MISC:EMC-AUTH-BYPASS

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

EMC Data Protection Advisor Application Service Static Credentials Authentication Bypass

Release Date

2018/02/07

Update Number

3035

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: EMC Data Protection Advisor Application Service Static Credentials Authentication Bypass


A static credentials authentication bypass vulnerability has been reported in the EMC Data Protection Advisor Application service. Successful exploitation would allow the attacker to authenticate to the target server as an administrative user.

Extended Description

EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. Affected accounts are: "Apollo System Test", "emc.dpa.agent.logon" and "emc.dpa.metrics.logon". An attacker with knowledge of the password could potentially use these accounts via REST APIs to gain unauthorized access to EMC Data Protection Advisor (including potentially access with administrative privileges).

Affected Products

  • Emc data_protection_advisor 6.3.0
  • Emc data_protection_advisor 6.4.0

References

  • CVE: CVE-2017-8013
  • URL: http://www.zerodayinitiative.com/advisories/zdi-17-811/
  • URL: http://seclists.org/fulldisclosure/2017/sep/36

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out