Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:32416
HistoryAug 24, 2015 - 12:00 a.m.

Weak authentication in EMC Secure Remote Services Virtual Edition Web Portal

2015-08-2400:00:00
vulners.com
15

Weak authentication in EMC Secure Remote Services Virtual Edition Web
Portal

Han Sahin, November 2014


Abstract

It was discovered that the session tokens in EMC Secure Remote Services
Virtual Edition are Base64 encoded XML tokens that lack any
cryptographic protection. Due to this it is possible for attackers to
create their own session cookies. Attackers with network access
(insiders) to the ESRS Web Portal can exploit this issue to gain
unauthorized access to the management interface.


Affected versions

EMC reports that the following versions are affected by this
vulnerability:

  • EMC Secure Remote Services Virtual Edition 3.02
  • EMC Secure Remote Services Virtual Edition 3.03
  • EMC Secure Remote Services Virtual Edition 3.04

See also

  • CVE-2015-0544 [2]
  • ESA-2015-097 [3]: EMC Secure Remote Services (ESRS) Virtual Edition
    (VE) Multiple Security Vulnerabilities

Fix

EMC released EMC Secure Remote Services Virtual Edition 3.06 that
resolves this vulnerability. Registered EMC Online Support customers can
download patches and software from support.emc.com [4] at:

EMC Secure Remote Services -> EMC Secure Remote Services Virtual Edition
-> Downloads


Details

https://www.securify.nl/advisory/SFY20141115/weak_authentication_in_emc_secure_remote_services_virtual_edition_web_portal.html

Related for SECURITYVULNS:DOC:32416