Dell RecoverPoint for VMs, version(s) 6.0.x contain(s) a Use of a Broken or Risky Cryptographic Algorithm vulnerability in the SSH. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Remote execution.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dell
Dell recoverpoint For Virtual Machines |
|
| CPEs | cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:* cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:* |
|
| Vendors & Products |
Dell
Dell recoverpoint For Virtual Machines |
Fri, 13 Dec 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dell RecoverPoint for VMs, version(s) 6.0.x contain(s) a Use of a Broken or Risky Cryptographic Algorithm vulnerability in the SSH. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Remote execution. | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: dell
Published: 2024-12-13T14:20:15.834Z
Updated: 2024-12-13T20:38:25.646Z
Reserved: 2024-03-13T15:44:22.628Z
Link: CVE-2024-28980
Updated: 2024-12-13T19:09:43.568Z
Status : Analyzed
Published: 2024-12-13T15:15:26.953
Modified: 2025-02-04T15:55:29.643
Link: CVE-2024-28980
No data.