ID CVE-2012-4615
Summary EMC Smarts Network Configuration Manager (NCM) before 9.1 uses a hardcoded encryption key for the storage of credentials, which allows local users to obtain sensitive information via unspecified vectors. Per: http://www.emc.com/it-management/smarts/index.htm "EMC Smarts (previously IT Operations Intelligence 9.0)..."
References
Vulnerable Configurations
  • cpe:2.3:a:emc:it_operations_intelligence:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:emc:it_operations_intelligence:9.0:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 17-08-2013 - 06:49)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 56682
bugtraq 20121126 ESA-2012-057: EMC Smarts Network Configuration Manager Multiple Vulnerabilities
misc http://packetstormsecurity.org/files/118358/EMC-Smarts-Network-Configuration-Manager-Bypass.html
osvdb 87878
sectrack 1027812
secunia 51408
Last major update 17-08-2013 - 06:49
Published 27-11-2012 - 21:55
Last modified 17-08-2013 - 06:49
Back to Top