DSA-2019-059: Dell EMC Network Attached Storage System using Windows Storage Server Security Update for Multiple Hardware Appliance Firmware Vulnerabilities


DSA-2019-059: Dell EMC Network Attached Storage System using Windows Storage Server Security Update for Multiple Hardware Appliance Firmware Vulnerabilities


Dell EMC Identifier: DSA-2019-059

CVE Identifiers: CVE-2018-15774, CVE-2018-15776, CVE-2019-3705, CVE-2019-3706, CVE-2019-3707

Severity Rating: CVSSv3 Base Score: See NVD (http://nvd.nist.gov/) for individual scores for each CVE

Severity: High

Affected Products:

  • Dell EMC Storage NX3340, NX3240, NX430, NX3330, NX3230

Summary:

Dell EMC iDRAC (Integrated Dell Remote Access Controller) in Dell EMC Network Attached Storage System using Windows Storage Server, requires a security update to address multiple vulnerabilities.

Details:

An integrated Dell Remote Access Controller (iDRAC) is an embedded management platform in PowerEdge servers used in Dell EMC Network Attached Storage System using Windows Storage Server. iDRAC provides browser-based and command-line interfaces for managing and monitoring the server hardware.

Dell EMC iDRAC has been updated to address the following vulnerabilities:

  • CVE-2018-15774
  • CVE-2018-15776
  • CVE-2019-3705
  • CVE-2019-3706
  • CVE-2019-3707

See Dell EMC iDRAC Advisories for more information:

Dell EMC iDRAC Multiple Vulnerabilities (CVE-2018-15774 and CVE-2018-15776)

DSA-2019-028: Dell EMC iDRAC Multiple Vulnerabilities

Resolution:

Dell EMC recommends all impacted customers upgrade to the appropriate release:

  • Dell EMC Dell EMC Storage NX3340, NX3240 iDRAC9 firmware version 3.32.32.32
  • Dell EMC Dell EMC Storage NX430, NX3330, NX3230 iDRAC8 firmware version 2.62.60.60

Link to Remedies:

Customers can download iDRAC firmware for PowerEdge servers and for all other platforms, please select the platform from the Dell support site.

Severity Rating:

For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.

Legal Information:

Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC distributes Dell EMC Security Advisories, in order to bring to the attention of users of the affected Dell EMC products, important security information. Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.





Article ID: SLN316983

Last Date Modified: 04/29/2019 02:22 PM

Rate this article

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\
characters left.