Dell Powerprotect Cyber Recovery
By the Year
In 2024 there have been 0 vulnerabilities in Dell Powerprotect Cyber Recovery . Last year Powerprotect Cyber Recovery had 1 security vulnerability published. Right now, Powerprotect Cyber Recovery is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 1 | 8.80 |
2022 | 2 | 8.45 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Powerprotect Cyber Recovery vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Dell Powerprotect Cyber Recovery Security Vulnerabilities
Dell Power Protect Cyber Recovery, contains an Authentication Bypass vulnerability
CVE-2023-32465
8.8 - High
- June 14, 2023
Dell Power Protect Cyber Recovery, contains an Authentication Bypass vulnerability. An attacker could potentially exploit this vulnerability, leading to unauthorized admin access to the Cyber Recovery application. Exploitation may lead to complete system takeover by an attacker.
Improper Neutralization of HTTP Headers for Scripting Syntax
Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability
CVE-2022-34372
9.1 - Critical
- September 01, 2022
Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially access and interact with the docker registry API leading to an authentication bypass. The attacker may potentially alter the docker images leading to a loss of integrity and confidentiality
authentification
Dell PowerProtect Cyber Recovery, versions prior to 19.11, contain a privilege escalation vulnerability on virtual appliance deployments
CVE-2022-32481
7.8 - High
- July 07, 2022
Dell PowerProtect Cyber Recovery, versions prior to 19.11, contain a privilege escalation vulnerability on virtual appliance deployments. A lower-privileged authenticated user can chain docker commands to escalate privileges to root leading to complete system takeover.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Dell Powerprotect Cyber Recovery or by Dell? Click the Watch button to subscribe.