{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T07:25:40.894","vulnerabilities":[{"cve":{"id":"CVE-2017-4989","sourceIdentifier":"security_alert@emc.com","published":"2017-06-21T20:29:00.297","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In EMC Avamar Server Software 7.3.1-125, 7.3.0-233, 7.3.0-226, 7.2.1-32, 7.2.1-31, 7.2.0-401, an unauthenticated remote attacker may potentially bypass the authentication process to gain access to the system maintenance page. This may be exploited by an attacker to view sensitive information, perform software updates, or run maintenance workflows."},{"lang":"es","value":"En EMC Avamar Server Software 7.3.1-125, 7.3.0-233, 7.3.0-226, 7.2.1-32, 7.2.1-31 y 7.2.0-401, un atacante remoto no autenticado podría omitir el proceso de autenticación para obtener acceso a la página de mantenimiento del sistema. Esto podría ser explotado por un atacante para ver información sensible, realizar actualizaciones de software o llevar a cabo flujos de trabajo de mantenimiento."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:emc:avamar_server:7.2.0-401:*:*:*:*:*:*:*","matchCriteriaId":"5BD7E9AC-6477-4C58-A5CA-E294C2D0AB76"},{"vulnerable":true,"criteria":"cpe:2.3:a:emc:avamar_server:7.2.1-31:*:*:*:*:*:*:*","matchCriteriaId":"3EB2AC0F-B8B3-4232-B530-D9F01D7ECCB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:emc:avamar_server:7.2.1-32:*:*:*:*:*:*:*","matchCriteriaId":"CF5A76F8-15A8-4FE5-884E-6A46337B6F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:emc:avamar_server:7.3.0-226:*:*:*:*:*:*:*","matchCriteriaId":"D2E105BC-BCB8-481F-B21F-2FB4653CA1C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:emc:avamar_server:7.3.0-233:*:*:*:*:*:*:*","matchCriteriaId":"133FFE19-9914-4E7E-BDE4-FF04B6554F5B"},{"vulnerable":true,"criteria":"cpe:2.3:a:emc:avamar_server:7.3.1-125:*:*:*:*:*:*:*","matchCriteriaId":"2DA69C30-4908-4DCD-AC7C-989E81FC7528"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/540754/30/0/threaded","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/99243","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038718","source":"security_alert@emc.com"},{"url":"http://www.securityfocus.com/archive/1/540754/30/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/99243","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038718","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}