{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T23:08:41.987","vulnerabilities":[{"cve":{"id":"CVE-2024-22425","sourceIdentifier":"security_alert@emc.com","published":"2024-02-16T12:15:07.757","lastModified":"2025-01-23T16:51:37.177","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains a brute force/dictionary attack vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to launch a brute force attack or a dictionary attack against the RecoverPoint login form. This allows attackers to brute-force the password of valid users in an automated manner."},{"lang":"es","value":"Dell RecoverPoint for Virtual Machines 5.3.x contiene una vulnerabilidad de ataque de fuerza bruta/diccionario. Un atacante remoto no autenticado podría explotar esta vulnerabilidad, lo que llevaría a lanzar un ataque de fuerza bruta o un ataque de diccionario contra el formulario de inicio de sesión de RecoverPoint. Esto permite a los atacantes forzar la contraseña de usuarios válidos de forma automatizada."}],"metrics":{"cvssMetricV31":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security_alert@emc.com","type":"Secondary","description":[{"lang":"en","value":"CWE-307"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2:*:*:*:*:*:*","matchCriteriaId":"0D63758C-7150-4B89-BD05-08AAA2C3D018"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p1:*:*:*:*:*:*","matchCriteriaId":"AE782786-D263-4946-8CDF-8FDA831FC6C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p2:*:*:*:*:*:*","matchCriteriaId":"7494092A-686D-4AE7-B420-80586564FA27"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p4:*:*:*:*:*:*","matchCriteriaId":"F113FDFF-78AC-4F85-82B6-A01F2DD12CAB"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp3_p1:*:*:*:*:*:*","matchCriteriaId":"FE37056B-7198-4A83-8912-99DA65E6D889"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp3_p2:*:*:*:*:*:*","matchCriteriaId":"B31D991B-B2BB-4D75-AA16-B47A87D556FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*","matchCriteriaId":"DD0ABCD5-9273-4799-A916-3518ED5EBB46"}]}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/en-us/000222133/dsa-2024-092-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities","source":"security_alert@emc.com","tags":["Vendor Advisory"]},{"url":"https://www.dell.com/support/kbdoc/en-us/000228154/dsa-2024-369-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities","source":"security_alert@emc.com","tags":["Vendor Advisory"]},{"url":"https://www.dell.com/support/kbdoc/en-us/000222133/dsa-2024-092-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}