DSA-2022-265: Dell iDRAC8 and Dell iDRAC9 Security Update for a RACADM Vulnerability

摘要: Dell iDRAC8 and Dell iDRAC9 remediation are available for an input validation vulnerability that may be exploited by high privileged malicious users to bypass the firmware lock-down and perform a firmware update. ...

本文适用于 本文不适用于 本文并非针对某种特定的产品。 本文并非包含所有产品版本。

影响

Low

详情

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-34435 Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-34436 Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update.
 
2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-34435 Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-34436 Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update.
 
2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies 建议所有客户考虑 CVSS 基本分数以及任何相关的时间和环境分数,这可能会影响与特定安全漏洞相关的潜在严重程度。

受影响的产品和补救措施

CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-34435 Dell iDRAC9 Versions before 6.00.30.00 6.00.30.00 https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF
CVE-2022-34436 Dell iDRAC8 Versions before 2.84.84.84 2.84.84.84 https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW 
CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-34435 Dell iDRAC9 Versions before 6.00.30.00 6.00.30.00 https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF
CVE-2022-34436 Dell iDRAC8 Versions before 2.84.84.84 2.84.84.84 https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW 

修订历史记录

RevisionDateDescription
1.02022-11-14Initial release
2.02023-04-03Updated "Affected Products and Remediation" section with iDRAC8 Updated Version
3.02023-08-11Tagged Azure Stack Hub

确认

Dell Technologies would like to thank the Cloud Compute Security Team from Google for reporting this issue.
 

相关信息

受影响的产品

iDRAC8, iDRAC9, Integrated System for Microsoft Azure Stack Hub, Integrated System for Microsoft Azure Stack Hub 13G, Integrated System for Microsoft Azure Stack Hub 14G, iDRAC9 - 3.0x Series, iDRAC9 - 3.1x Series, iDRAC9 - 3.2x Series , iDRAC9 - 3.3x Series, iDRAC9 - 3.4x Series, iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series, iDRAC9 - 6.xx Series, Product Security Information ...
文章属性
文章编号: 000205346
文章类型: Dell Security Advisory
上次修改时间: 11 8月 2023
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。