DSA-2021-144: Dell Wyse ThinOS Security Update for Multiple Vulnerabilities

Resumen: Dell Wyse ThinOS (9.x) remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Este artículo se aplica a Este artículo no se aplica a Este artículo no está vinculado a ningún producto específico. No se identifican todas las versiones del producto en este artículo.

Impacto

High

Detalles

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-21597 Dell Wyse ThinOS (9.x), version 9.0, contains a Sensitive Information Disclosure Vulnerability. An authenticated malicious user with physical access to the system may exploit this vulnerability to read sensitive information written to the log files. 7.2 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-21598 Dell Wyse ThinOS (9.x), versions 9.0, 9.1, and 9.1 MR1, contain a Sensitive Information Disclosure Vulnerability. An authenticated attacker with physical access to the system may exploit this vulnerability to read sensitive Smartcard data in log files. 3.9 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-21597 Dell Wyse ThinOS (9.x), version 9.0, contains a Sensitive Information Disclosure Vulnerability. An authenticated malicious user with physical access to the system may exploit this vulnerability to read sensitive information written to the log files. 7.2 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-21598 Dell Wyse ThinOS (9.x), versions 9.0, 9.1, and 9.1 MR1, contain a Sensitive Information Disclosure Vulnerability. An authenticated attacker with physical access to the system may exploit this vulnerability to read sensitive Smartcard data in log files. 3.9 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Dell Technologies recomienda que todos los clientes tengan en cuenta tanto la puntuación base como cualquier otra puntuación ambiental y temporal relevante que pueda afectar la posible gravedad asociada con la vulnerabilidad de seguridad en particular.

Corrección y productos afectados

Product Affected Versions Updated versions Link to update
Dell Wyse 3040 Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 3040 Thin Client
Dell Wyse 3040 Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 3040 Thin Client with PCoIP
Dell Wyse 5070 Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 5070 Thin Client
Dell Wyse 5470 Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 5470 Thin Client
Dell Wyse 5470 All-in-One Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 5470 All-in-One Thin Client
Dell Wyse 5070 Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 5070 Thin Client with PCoIP
Dell Wyse 5470 Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 5470 Thin Client with PCoIP
Dell Wyse 5470 All-in-One Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 5470 All-in-One Thin Client with PCoIP
Product Affected Versions Updated versions Link to update
Dell Wyse 3040 Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 3040 Thin Client
Dell Wyse 3040 Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 3040 Thin Client with PCoIP
Dell Wyse 5070 Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 5070 Thin Client
Dell Wyse 5470 Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 5470 Thin Client
Dell Wyse 5470 All-in-One Thin Client 9.0, 9.1 9.1 MR3 Dell Wyse 5470 All-in-One Thin Client
Dell Wyse 5070 Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 5070 Thin Client with PCoIP
Dell Wyse 5470 Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 5470 Thin Client with PCoIP
Dell Wyse 5470 All-in-One Thin Client with PCoIP 9.0, 9.1 9.1 MR3 Dell Wyse 5470 All-in-One Thin Client with PCoIP

Historial de revisiones

RevisionDateDescription
1.02021-07-21Initial Release

Información relacionada

Productos afectados

Product Security Information, Dell ThinOS
Propiedades del artículo
Número del artículo: 000189543
Tipo de artículo: Dell Security Advisory
Última modificación: 18 sept. 2025
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.