An internal product security audit of Lenovo XClarity Controller (XCC) discovered that the XCC configuration backup/restore password may be written to an internal XCC log buffer if Lenovo XClarity Administrator (LXCA) is used to perform the backup/restore. The backup/restore password typically exists in this internal log buffer for less than 10 minutes before being overwritten. Generating an FFDC service log will include the log buffer contents, including the backup/restore password if present. The FFDC service log is only generated when requested by a privileged XCC user and it is only accessible to the privileged XCC user that requested the file. The backup/restore password is not captured if the backup/restore is initiated directly from XCC.
Attack Vector Network
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
AV:N/AC:L/Au:S/C:P/I:N/A:N
Vendors | Products |
---|---|
Lenovo |
|
Configuration 1 [-]
AND |
|
Configuration 2 [-]
AND |
|
Configuration 3 [-]
AND |
|
Configuration 4 [-]
AND |
|
References
Link | Resource |
---|---|
https://support.lenovo.com/us/en/product_security/LEN-52117 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: lenovo
Published: 2021-04-13T20:41:46
Updated: 2021-04-13T20:41:46
Reserved: 2021-03-29T00:00:00
Link: CVE-2021-3473
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-13T21:15:25.410
Modified: 2021-04-23T19:14:51.250
Link: CVE-2021-3473
JSON object: View
Redhat Information
No data.