VAR-201706-0320
Vulnerability from variot - Updated: 2025-04-20 23:26In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user may potentially escalate their privileges to root due to authorization checks not being performed on certain perl scripts. This may potentially be exploited by an attacker to run arbitrary commands as root on the targeted VNX Control Station system. EMC VNX1/VNX2 OE for File are prone to a local privilege-escalation vulnerability. The vulnerability stems from the fact that the program does not perform authentication. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
ESA-2017-041: EMC VNX1 and VNX2 Family Multiple Vulnerabilities in VNX Control Station
EMC Identifier: ESA-2017-041
CVE Identifier: CVE-2017-4984, CVE-2017-4985, CVE-2017-4987
Severity Rating: CVSS v3 Base Score: See below for individual CVEs.
Details:
Remote code execution vulnerability (CVE-2017-4984)
An unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. CVSS v3 Base Score: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Uncontrolled search path vulnerability (CVE-2017-4987)
This vulnerability may be exploited by a local authenticated user to load a maliciously crafted file in the search path which may potentially allow the attacker to execute arbitrary code on the targeted VNX Control Station system.
Link to remedies:
To upgrade your EMC VNX system contact EMC VNX Customer Support: https://support.emc.com
Registered EMC Support customers can download EMC VNX software from the EMC Online Support web site at https://support.emc.com.
[The following is standard text included in all security advisories. Please do not change or delete.]
Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867.
For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQEcBAEBCAAGBQJZP+8EAAoJEHbcu+fsE81ZcQAIAKQy3Bz6TVxivhhkTu/JyasN NRL0ZGplMm8gy8nCQyu+8VuiWz/OKIyvc1HClt+cD4LcjbIH04jxx5/3TU7FtI2X RjOcngSq40lWWcmlJ4m8E1AejLiS26+bx35wFxR9jU75htfKlrb7VHXn8XjBDieb q8csQkdHS11oOXhxrzqkwmPJ9y1qvFd01ikAsNk92iJwiiK9eaGW8ZS5NpLVd0Tm DWgmZzz1mACdfS0gl/13QiBKgyB3S6QkaaWzDTwAr/kBx8EZwXNDb8YqjVLYt5Q3 zUhZILy57Tje9cC3rZyFxFAhYdAZtjSjoJ+Tp8fqhLQOjqcBuQ3PPw2kgHYiI/M= =9F5r -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0320",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vnx1",
"scope": "eq",
"trust": 1.6,
"vendor": "emc",
"version": null
},
{
"model": "vnx2",
"scope": "eq",
"trust": 1.6,
"vendor": "emc",
"version": null
},
{
"model": "vnx1",
"scope": "lt",
"trust": 0.8,
"vendor": "dell emc old emc",
"version": "oe for file 7.1.80.8"
},
{
"model": "vnx2",
"scope": "lt",
"trust": 0.8,
"vendor": "dell emc old emc",
"version": "oe for file 8.1.9.211"
},
{
"model": "vnx2 oe for file",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "8.1.9.155"
},
{
"model": "vnx1 oe for file",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "7.1.79.6"
},
{
"model": "vnx2 oe for file",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "8.1.9.211"
},
{
"model": "vnx1 oe for file",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "7.1.80.8"
}
],
"sources": [
{
"db": "BID",
"id": "99037"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
},
{
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:emc:vnx1_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:emc:vnx2_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "EMC",
"sources": [
{
"db": "BID",
"id": "99037"
}
],
"trust": 0.3
},
"cve": "CVE-2017-4985",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-4985",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-113188",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2017-4985",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-4985",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-4985",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-814",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-113188",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-113188"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
},
{
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user may potentially escalate their privileges to root due to authorization checks not being performed on certain perl scripts. This may potentially be exploited by an attacker to run arbitrary commands as root on the targeted VNX Control Station system. EMC VNX1/VNX2 OE for File are prone to a local privilege-escalation vulnerability. The vulnerability stems from the fact that the program does not perform authentication. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nESA-2017-041: EMC VNX1 and VNX2 Family Multiple Vulnerabilities in VNX Control Station\n\nEMC Identifier: ESA-2017-041\nCVE Identifier: CVE-2017-4984, CVE-2017-4985, CVE-2017-4987 \t\nSeverity Rating: CVSS v3 Base Score: See below for individual CVEs. \n\nDetails: \n\n\tRemote code execution vulnerability (CVE-2017-4984)\n\n\nAn unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. \nCVSS v3 Base Score: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\t\n\n\tUncontrolled search path vulnerability (CVE-2017-4987)\n\nThis vulnerability may be exploited by a local authenticated user to load a maliciously crafted file in the search path which may potentially allow the attacker to execute arbitrary code on the targeted VNX Control Station system. \n\nLink to remedies:\n\nTo upgrade your EMC VNX system contact EMC VNX Customer Support: https://support.emc.com \nRegistered EMC Support customers can download EMC VNX software from the EMC Online Support web site at https://support.emc.com. \n\n\n[The following is standard text included in all security advisories. Please do not change or delete.]\n\nRead and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. \n\nFor an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\nEMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided \"as is\" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2\n\niQEcBAEBCAAGBQJZP+8EAAoJEHbcu+fsE81ZcQAIAKQy3Bz6TVxivhhkTu/JyasN\nNRL0ZGplMm8gy8nCQyu+8VuiWz/OKIyvc1HClt+cD4LcjbIH04jxx5/3TU7FtI2X\nRjOcngSq40lWWcmlJ4m8E1AejLiS26+bx35wFxR9jU75htfKlrb7VHXn8XjBDieb\nq8csQkdHS11oOXhxrzqkwmPJ9y1qvFd01ikAsNk92iJwiiK9eaGW8ZS5NpLVd0Tm\nDWgmZzz1mACdfS0gl/13QiBKgyB3S6QkaaWzDTwAr/kBx8EZwXNDb8YqjVLYt5Q3\nzUhZILy57Tje9cC3rZyFxFAhYdAZtjSjoJ+Tp8fqhLQOjqcBuQ3PPw2kgHYiI/M=\n=9F5r\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-4985"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "BID",
"id": "99037"
},
{
"db": "VULHUB",
"id": "VHN-113188"
},
{
"db": "PACKETSTORM",
"id": "142981"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-4985",
"trust": 2.9
},
{
"db": "BID",
"id": "99037",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-113188",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142981",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-113188"
},
{
"db": "BID",
"id": "99037"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "PACKETSTORM",
"id": "142981"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
},
{
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"id": "VAR-201706-0320",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-113188"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-20T23:26:04.866000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "EMC VNX\u30d5\u30a1\u30df\u30ea\u30fc",
"trust": 0.8,
"url": "https://www.dellemc.com/ja-jp/storage/vnx.htm"
},
{
"title": "EMC VNX2 OE for File and VNX1 OE for File Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71259"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-862",
"trust": 1.1
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-113188"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/archive/1/540738/30/0/threaded"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/99037"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-4985"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-4985"
},
{
"trust": 0.3,
"url": "http://www.emc.com/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-4984"
},
{
"trust": 0.1,
"url": "https://support.emc.com"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-4987"
},
{
"trust": 0.1,
"url": "https://support.emc.com."
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-113188"
},
{
"db": "BID",
"id": "99037"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "PACKETSTORM",
"id": "142981"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
},
{
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-113188"
},
{
"db": "BID",
"id": "99037"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"db": "PACKETSTORM",
"id": "142981"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
},
{
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-113188"
},
{
"date": "2017-06-13T00:00:00",
"db": "BID",
"id": "99037"
},
{
"date": "2017-07-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"date": "2017-06-16T17:32:22",
"db": "PACKETSTORM",
"id": "142981"
},
{
"date": "2017-06-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-814"
},
{
"date": "2017-06-19T12:29:00.293000",
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-113188"
},
{
"date": "2017-06-13T00:00:00",
"db": "BID",
"id": "99037"
},
{
"date": "2017-07-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005010"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-814"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-4985"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "99037"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "EMC VNX2 and VNX1 Authority in root Vulnerability promoted to",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005010"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-814"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.