CVE-2017-14385
moderate-risk
Published 2017-12-20
An issue was discovered in EMC Data Domain DD OS 5.7 family, versions prior to 5.7.5.6; EMC Data Domain DD OS 6.0 family, versions prior to 6.0.2.9; EMC Data Domain DD OS 6.1 family, versions prior to 6.1.0.21; EMC Data Domain Virtual Edition 2.0 family, all versions; EMC Data Domain Virtual Edition 3.0 family, versions prior to 3.0 SP2 Update 1; and EMC Data Domain Virtual Edition 3.1 family, versions prior to 3.1 Update 2. EMC Data Domain DD OS contains a memory overflow vulnerability in SMBv1 which may potentially be exploited by an unauthenticated remote attacker. An attacker may completely shut down both the SMB service and active directory authentication. This may also allow remote code injection and execution.
Do I need to act?
~
9.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (5)
Data Domain
Data Domain
Data Domain
Data Domain Os
Data Domain
Affected Vendors
References (6)
Mailing List
http://seclists.org/fulldisclosure/2017/Dec/79
Third Party Advisory
http://www.securityfocus.com/bid/102289
Third Party Advisory
http://www.securitytracker.com/id/1040027
Mailing List
http://seclists.org/fulldisclosure/2017/Dec/79
Third Party Advisory
http://www.securityfocus.com/bid/102289
Third Party Advisory
http://www.securitytracker.com/id/1040027
48
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
10/34 · Low
Exposure
12/34 · Low