📦 Elastic Cloud Storage
by Dell
🔍 What is Elastic Cloud Storage?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
Dell ECS and ObjectScale systems contain default credentials that allow low-privileged attackers with remote access to elevate privileges. This affects Dell ECS versions 3.8.1.0 through 3.8.1.7 and De...
Dell ECS and ObjectScale systems transmit sensitive information without encryption, allowing unauthenticated remote attackers to intercept and read this data. This affects Dell ECS versions 3.8.1.0 th...
An arithmetic overflow vulnerability in Dell ECS retention period handling allows authenticated users with bucket/object access to bypass retention policies and delete objects. This affects Dell ECS v...
Dell ECS and ObjectScale systems transmit sensitive information in cleartext via Fabric Syslog, allowing unauthenticated attackers with network access to intercept and potentially modify data. This af...
Dell ECS and ObjectScale contain sensitive information in source code that could be exposed to local low-privileged attackers. This vulnerability affects Dell ECS versions 3.8.1.0 through 3.8.1.7 and ...
Dell ECS and ObjectScale store sensitive information in cleartext, allowing local low-privileged attackers to read confidential data. This affects Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell Ob...
Dell ECS versions 3.8.1.4 and earlier contain an improper input validation vulnerability that allows low-privileged remote attackers to execute arbitrary code. This affects organizations using vulnera...
Dell ECS versions before 3.8.1 contain a privilege elevation vulnerability in user management. A remote attacker with high privileges could exploit this to gain unauthorized access to endpoints. This ...