Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially access and interact with the docker registry API leading to an authentication bypass. The attacker may potentially alter the docker images leading to a loss of integrity and confidentiality
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.