Описание
The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.2.3 (включая)
Одно из
cpe:2.3:a:emc:replication_manager:*:*:client:*:*:*:*:*
cpe:2.3:a:emc:replication_manager:2.0:*:client:*:*:*:*:*
cpe:2.3:a:emc:replication_manager:5.2:*:client:*:*:*:*:*
cpe:2.3:a:emc:replication_manager:5.2.2:*:client:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:a:emc:networker_module:2.1:-:microsoft_applications:*:*:*:*:*
cpe:2.3:a:emc:networker_module:2.2:-:microsoft_applications:*:*:*:*:*
EPSS
Процентиль: 99%
0.73163
Высокий
10 Critical
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
EPSS
Процентиль: 99%
0.73163
Высокий
10 Critical
CVSS2
Дефекты
CWE-20