DSA-2022-265: Dell iDRAC8 and Dell iDRAC9 Security Update for a RACADM Vulnerability
Summary: Dell iDRAC8 and Dell iDRAC9 remediation are available for an input validation vulnerability that may be exploited by high privileged malicious users to bypass the firmware lock-down and perform a firmware update. ...
Acest articol se aplică pentru
Acest articol nu se aplică pentru
Acest articol nu este legat de un produs specific.
Acest articol nu acoperă toate versiunile de produs existente.
Impact
Low
Details
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
Produse afectate și măsuri de remediere
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
Revision History
| Revision | Date | Description |
| 1.0 | 2022-11-14 | Initial release |
| 2.0 | 2023-04-03 | Updated "Affected Products and Remediation" section with iDRAC8 Updated Version |
| 3.0 | 2023-08-11 | Tagged Azure Stack Hub |
Acknowledgements
Dell Technologies would like to thank the Cloud Compute Security Team from Google for reporting this issue.
Related Information
Exonerare de răspundere
Produse afectate
iDRAC8, iDRAC9, Integrated System for Microsoft Azure Stack Hub, Integrated System for Microsoft Azure Stack Hub 13G, Integrated System for Microsoft Azure Stack Hub 14G, iDRAC9 - 3.0x Series, iDRAC9 - 3.1x Series, iDRAC9 - 3.2x Series
, iDRAC9 - 3.3x Series, iDRAC9 - 3.4x Series, iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series, iDRAC9 - 6.xx Series, Product Security Information
...
Proprietăți articol
Article Number: 000205346
Article Type: Dell Security Advisory
Ultima modificare: 11 Aug 2023
Găsiți răspunsuri la întrebările dvs. de la alți utilizatori Dell
Servicii de asistență
Verificați dacă dispozitivul dvs. este acoperit de serviciile de asistență.