{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T03:45:28.189","vulnerabilities":[{"cve":{"id":"CVE-2024-53292","sourceIdentifier":"security_alert@emc.com","published":"2024-12-11T08:15:06.423","lastModified":"2025-02-04T16:16:22.017","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account."},{"lang":"es","value":"Dell VxVerify, versiones anteriores a x.40.405, contienen una vulnerabilidad de almacenamiento de contraseñas en texto plano en el contenedor de shell. Un atacante local con privilegios elevados podría aprovechar esta vulnerabilidad, lo que llevaría a la divulgación de ciertas credenciales de usuario. El atacante podría usar las credenciales expuestas para acceder al componente vulnerable con privilegios de la cuenta comprometida."}],"metrics":{"cvssMetricV31":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.6,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"weaknesses":[{"source":"security_alert@emc.com","type":"Secondary","description":[{"lang":"en","value":"CWE-256"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dell:vxrail_hyperconverged_infrastructure:*:*:*:*:*:*:*:*","versionEndExcluding":"x.40.405","matchCriteriaId":"6B43C1AA-2261-46C8-BFD5-6C299616827E"}]}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities","source":"security_alert@emc.com","tags":["Vendor Advisory"]}]}}]}