High severity7.8NVD Advisory· Published Jun 19, 2017· Updated May 13, 2026
CVE-2017-4985
CVE-2017-4985
Description
In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user may potentially escalate their privileges to root due to authorization checks not being performed on certain perl scripts. This may potentially be exploited by an attacker to run arbitrary commands as root on the targeted VNX Control Station system.
Affected products
2- cpe:2.3:o:emc:vnx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:emc:vnx2_firmware:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.securityfocus.com/archive/1/540738/30/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/99037nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.