{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-36318","assignerOrgId":"c550e75a-17ff-4988-97f0-544cde3820fe","assignerShortName":"dell","datePublished":"2021-12-21T17:05:25.057Z","dateUpdated":"2024-09-17T02:10:36.663Z","dateReserved":"2021-07-08T00:00:00.000Z"},"containers":{"cna":{"datePublic":"2021-11-09T00:00:00.000Z","providerMetadata":{"orgId":"c550e75a-17ff-4988-97f0-544cde3820fe","shortName":"dell","dateUpdated":"2022-10-16T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Dell EMC Avamar versions 18.2,19.1,19.2,19.3,19.4 contain a plain-text password storage vulnerability. A high privileged user could potentially exploit this vulnerability, leading to a complete outage."}],"affected":[{"vendor":"Dell","product":"Avamar","versions":[{"version":"unspecified","lessThan":"18.2 19.1 19.2 19.3 19.4","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/000193369"},{"name":"GLSA-202210-09","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202210-09"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-532: Information Exposure Through Log Files","cweId":"CWE-532"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T00:54:51.414Z"},"title":"CVE Program Container","references":[{"url":"https://www.dell.com/support/kbdoc/000193369","tags":["x_transferred"]},{"name":"GLSA-202210-09","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202210-09"}]}]}}