cve/2021/CVE-2021-36326.md
2025-09-29 21:09:30 +02:00

18 lines
1019 B
Markdown

### [CVE-2021-36326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36326)
![](https://img.shields.io/static/v1?label=Product&message=Dell%20EMC%20Streaming%20Data%20Platform&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-757%3A%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20('Algorithm%20Downgrade')&color=brightgreen)
### Description
Dell EMC Streaming Data Platform, versions prior to 1.3 contain an SSL Strip Vulnerability in the User Interface (UI). A remote unauthenticated attacker could potentially exploit this vulnerability, leading to a downgrade in the communications between the client and server into an unencrypted format.
### POC
#### Reference
- https://www.dell.com/support/kbdoc/en-in/000193697/dsa-2021-205-dell-emc-streaming-data-platform-security-update-for-third-party-vulnerabilities
#### Github
No PoCs found on GitHub currently.