HTTP: EMC Data Protection Advisor Application Service Static Credentials Authentication Bypass

A static credentials authentication bypass vulnerability has been reported in the EMC Data Protection Advisor Application service. Successful exploitation would allow the attacker to authenticate to the target server as an administrative user.

Extended Description

EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. Affected accounts are: "Apollo System Test", "emc.dpa.agent.logon" and "emc.dpa.metrics.logon". An attacker with knowledge of the password could potentially use these accounts via REST APIs to gain unauthorized access to EMC Data Protection Advisor (including potentially access with administrative privileges).

Affected Products

Emc data_protection_advisor

Short Name
HTTP:MISC:EMC-AUTH-BYPASS
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Advisor Application Authentication Bypass CVE-2017-8013 Credentials Data EMC Protection Service Static
Release Date
02/08/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3415
False Positive
Unknown
Vendors

Emc

CVSS Score

7.5

Found a potential security threat?