Advisory 2024-0732 - Dell ECS: Multiple Vulnerabilities
Date
2024-04-05
State
2024-04-05
Risk*
Damage: HIGH
Attack Probability: MEDIUM-HIGH
Attack
An attacker can exploit multiple vulnerabilities in Dell ECS in order to escalate privileges, execute arbitrary program code with administrative privileges, disclose information, manipulate files, perform a cross-site scripting attack, bypass security measures, or cause a denial of service condition.
* The probability of an attack is determined by the attacker's motivation, the necessary expend and the possibilities for an attack. The damage probability is determined by the expend needed to resolute the attack and probable indirecte consequences of an attack for business processes. Telekom Security assumes worst case scenarios.
Copyright © 1999-2024 Deutsche Telekom Security GmbH. All rights reserved. Reproduction and distribution of this publication in any form - even in parts - without prior written permission is forbidden.
The information contained herein has been obtained from sources believed to be reliable and trusted or have been verified. Telekom Security can take liability for completeness, accuracy and correctness only in so far, as gross negligence or intention create liability. Any liability beyond it, in particular possible damages resulting from using or non-usability of the information contained herein, is excluded.