PatchSiren

PatchSiren cyber security CVE debrief

CVE-2015-4056 Dell CVE debrief

CVE-2015-4056 describes weak cryptography in the System Library of VCE Vision Intelligent Operations before 2.6.5. According to the official vulnerability record, a local user with administrative access could leverage the flaw to discover credentials. The issue was publicly disclosed in the CVE/NVD record on 2017-02-21 and is categorized by NVD as CWE-310.

Vendor
Dell
Product
CVE-2015-4056
CVSS
MEDIUM 6.7
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-21
Original CVE updated
2026-05-13
Advisory published
2017-02-21
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Dell VCE Vision Intelligent Operations deployments, especially systems still running version 2.6.4 or earlier. Because the flaw requires local administrative access, it is most relevant where privileged accounts are shared, exposed, or insufficiently controlled.

Technical summary

NVD maps the affected product as Dell VCE Vision Intelligent Operations versions through 2.6.4, with the vulnerable component identified as the System Library. The weakness is a cryptographic implementation problem (CWE-310) that can expose credentials to a local user who already has administrative access. NVD assigns CVSS v3.1 vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, reflecting the need for high privileges and a local attack path.

Defensive priority

Medium. The attack requires local administrative privileges, which narrows exposure, but the impact includes credential discovery and high confidentiality/integrity/availability consequences if the issue is reachable in a real environment.

Recommended defensive actions

  • Upgrade Dell VCE Vision Intelligent Operations to version 2.6.5 or later, since versions before 2.6.5 are identified as affected.
  • Inventory deployments to confirm whether any systems remain on 2.6.4 or earlier.
  • Review local administrative access controls and remove unnecessary privileged accounts.
  • Rotate credentials if there is any reason to suspect exposure on affected systems.
  • Follow vendor and NVD guidance for any additional remediation notes or updates.

Evidence notes

The source corpus ties the issue to NVD and a Bugtraq reference from 2015-06 (seclists.org/bugtraq/2015/Jun/91). NVD states the affected CPE as dell:vce_vision_intelligent_operations with versionEndIncluding 2.6.4 and lists CWE-310. The CVE record was published on 2017-02-21 and later modified on 2026-05-13; those dates are disclosure/record-maintenance timestamps, not necessarily the original bug date.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-02-21. No KEV listing or ransomware linkage is provided in the supplied corpus.