Several vulnerabilities have been found by researchers in Dell EMC Avamar and Integrated Data Protection Appliance products. VMware’s vSphere Data Protection, which is based on Avamar, is also impacted.
Dell EMC informed customers this week that several versions of Avamar Server and Integrated Data Protection Appliance (IDPA) are affected by remote code execution and open redirection vulnerabilities.
The first flaw, tracked as CVE-2018-11066 and rated “critical,” allows an unauthenticated attacker to remotely execute arbitrary commands on the server. The second issue, identified as CVE-2018-11067 and rated “medium,” can be exploited by an unauthenticated attacker to redirect users to arbitrary URLs by tricking them into clicking on a specially crafted link.
Dell also informed customers of a high severity information exposure vulnerability affecting these products (CVE-2018-11076).
“Avamar Java management console’s SSL/TLS private key may be leaked in the Avamar Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users,” the company said.
Avamar and IDPA are also impacted by a vulnerability that can be exploited to execute arbitrary commands with root privileges (CVE-2018-11077). However, this flaw is less serious as the attacker requires admin privileges.
All of these flaws were reported to Dell EMC by Australia-based cybersecurity firm TSS.
VMware has also published an advisory, since its vSphere Data Protection (VDP) product is based on Avamar Virtual Edition. The vulnerabilities impact VDP 6.0.x and 6.1.x.
Both VMware and Dell EMC have released patches for these vulnerabilities.
This is not the first time VMware and Dell EMC have released advisories covering the same vulnerabilities. Back in January, the companies informed users of three potentially serious flaws affecting EMC’s Avamar Server, NetWorker Virtual Edition, and IDPA, and VMware’s VDP.
Related: VMware Patches Code Execution Flaw in Virtual Graphics Card
Related: VMware Patches Code Execution Flaw in AirWatch Agent
Related: VMware Patches VM Escape Flaw Disclosed at Chinese Hacking Contest

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
