6.5
CVSSv2

CVE-2019-3746

Published: 27/09/2019 Updated: 09/10/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Dell EMC Integrated Data Protection Appliance versions before 2.3 do not limit the number of authentication attempts to the ACM API. An authenticated remote user may exploit this vulnerability to launch a brute-force authentication attack in order to gain access to the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dell emc_integrated_data_protection_appliance_firmware 2.1

dell emc_integrated_data_protection_appliance_firmware 2.2

dell emc_integrated_data_protection_appliance_firmware 2.0

Github Repositories

I concluded this report with a imersive and very hand-on assesement where I was able to use the tactics and tools available as a Red team player giving me a better understading of how data exploitation happens and on the Blue side once the vulnerability have been identifiedvia SIEM, I was aware of the same malicious tactics, techniques and proce…

Introduction I concluded this report with an immersive and very hands-on assessment where I was able to use the tactics and tools available as a Red team player giving me a better understanding of how data exploitation happens and on the Blue side then once the vulnerability has been identified via SIEM (Kibana), I was aware of the same malicious tactics, techniques, and best p

Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.

University of Richmond Cybersecurity Capstone #2 As the Red Team, I attacked a VM, discovering several critical vulnerabilities As the Blue Team, I used Kibana to review logs taken during the Red Team Engagement I used the logs to extract hard data and visualizations for the report Then, I interpreted log data to suggest mitigation measures for each exploit Here is the

Cybersecurity Bootcamp Project-2, Red v Blue

University of Richmond Cybersecurity Capstone #2 As the Red Team, I attacked a VM, discovering several critical vulnerabilities As the Blue Team, I used Kibana to review logs taken during the Red Team Engagement I used the logs to extract hard data and visualizations for the report Then, I interpreted log data to suggest mitigation measures for each exploit Here is the

As the Red Team, attack a vulnerable VM within the environment, ultimately gaining root access to the machine. As Blue Team, use Kibana to review logs taken during Day 1 engagement of Red Team’s attack.. Use the logs to extract hard data and visualizations for a detailed report of findings.

Capstone-Engagement-Project-Red-Team-v-Blue-Team As the Red Team, attack a vulnerable VM within the environment, ultimately gaining root access to the machine As Blue Team, use Kibana to review logs taken during Day 1 engagement of Red Team’s attack Use the logs to extract hard data and visualizations for a detailed report of findings This document serves as an outlin

UR Cybersecurity Pentesting/SOC Analyst - Project 2. Attacking a vulnerable web server. Then assessing, analyzing and making suggestions for hardening the system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.

UR Cybersecurity Red Team / Blue Team Capstone Project 2 Assessment, Analysis, and Hardening of a vulnerable system This presentation includes playing the role of both (Red Team) pentester and (Blue Team) SOC analyst on a vulnerable WebDAV server As the Red Team, I attacked a vulnerable virtual webserver and gained root access, exposing several critical weaknesses along the