{"api_version":"1","generated_at":"2026-04-23T08:37:17+00:00","cve":"CVE-2017-14375","urls":{"html":"https://cve.report/CVE-2017-14375","api":"https://cve.report/api/cve/CVE-2017-14375.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-14375","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-14375"},"summary":{"title":"CVE-2017-14375","description":"EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system.","state":"PUBLIC","assigner":"security_alert@emc.com","published_at":"2017-11-01 01:29:00","updated_at":"2021-08-05 14:45:00"},"problem_types":["CWE-290"],"metrics":[],"references":[{"url":"http://seclists.org/fulldisclosure/2017/Oct/70","name":"http://seclists.org/fulldisclosure/2017/Oct/70","refsource":"CONFIRM","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: ESA-2017-137: EMC VMAX Virtual Appliance (vApp) Authentication Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/101673","name":"101673","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Multiple EMC Products CVE-2017-14375 Authentication Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1039704","name":"1039704","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"EMC Unisphere for VMAX Virtual Appliance Authentication Bypass Lets Remote Users Access the Target System - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-14375","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14375","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dell","cpe5":"emc_unisphere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmax","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"solutions_enabler","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"solutions_enabler","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"unisphere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmax","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"unisphere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmax","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"vasa","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"vasa","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"14375","vulnerable":"1","versionEndIncluding":"1.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"vmax_emanagement","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security_alert@emc.com","ID":"CVE-2017-14375","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"EMC VMAX Virtual Appliance (vApp) EMC Unisphere for VMAX Virtual Appliance versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier)","version":{"version_data":[{"version_value":"EMC VMAX Virtual Appliance (vApp) EMC Unisphere for VMAX Virtual Appliance versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier)"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Authentication Bypass Vulnerability"}]}]},"references":{"reference_data":[{"name":"101673","refsource":"BID","url":"http://www.securityfocus.com/bid/101673"},{"name":"http://seclists.org/fulldisclosure/2017/Oct/70","refsource":"CONFIRM","url":"http://seclists.org/fulldisclosure/2017/Oct/70"},{"name":"1039704","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1039704"}]}},"nvd":{"publishedDate":"2017-11-01 01:29:00","lastModifiedDate":"2021-08-05 14:45:00","problem_types":["CWE-290"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:vmax_emanagement:*:*:*:*:*:*:*:*","versionEndIncluding":"1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:vasa:*:*:*:*:*:*:*:*","versionEndExcluding":"8.4.0.512","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:solutions_enabler:*:*:*:*:*:*:*:*","versionEndExcluding":"8.4.0.15","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dell:emc_unisphere:*:*:*:*:*:vmax:*:*","versionEndExcluding":"8.4.0.15","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"14375","Ordinal":"111809","Title":"CVE-2017-14375","CVE":"CVE-2017-14375","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"14375","Ordinal":"1","NoteData":"EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"14375","Ordinal":"2","NoteData":"2017-10-31","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"14375","Ordinal":"3","NoteData":"2017-11-07","Type":"Other","Title":"Modified"}]}}}