DSA-2019-028: Dell Technologies iDRAC Multiple Vulnerabilities
Summary: Dell Technologies iDRAC has been updated to address multiple vulnerabilities which may potentially be exploited to compromise the affected systems.
Symptoms
DSA ID: DSA-2019-028
CVE Identifier: CVE-2019-3705, CVE-2019-3706, CVE-2019-3707
Severity: High
Severity Rating: See Details section below of individual CVSS Scores for each CVE.
Affected products:
- Dell Technologies iDRAC6 versions prior to 2.92 (CVE-2019-3705)
- Dell Technologies iDRAC7/iDRAC8 versions prior to 2.61.60.60 (CVE-2019-3705)
- Dell Technologies iDRAC9 versions prior to 3.30.30.30, 3.20.21.20, 3.21.24.22, 3.21.26.22, 3.23.23.23, 3.24.24.24, 3.22.22.22, 3.21.25.22 (CVE-2019-3705, CVE-2019-3706, and CVE-2019-3707)
Cause
Details:
- Buffer Overflow Vulnerability (CVE-2019-3705)
CVSSv3 Base Score 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
- Web Interface Authentication Bypass Vulnerability (CVE-2019-3706)
CVSSv3 Base Score 8.6 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)
- WS-MAN Authentication Bypass Vulnerability (CVE-2019-3707)
Resolution
The following Dell Technologies iDRAC firmware releases contain resolutions to these vulnerabilities:
|
iDRAC |
iDRAC firmware version |
|
iDRAC9 |
3.20.21.20 |
|
3.21.24.22 |
|
|
3.21.26.22 |
|
|
3.23.23.23 |
|
|
|
3.24.24.24 |
|
|
3.22.22.22 |
|
|
3.21.25.22 |
|
|
3.30.30.30 |
|
iDRAC8 |
2.61.60.60 |
|
iDRAC7 |
2.61.60.60 |
|
iDRAC6 |
2.92 |
Dell Technologies recommends all customers upgrade at the earliest opportunity.
Dell Best Practices regarding iDRAC:
In addition to maintaining up to date iDRAC firmware, Dell also advises the following:
- iDRACs are not designed nor intended to be placed on or connected to the Internet; they are intended to be on a separate management network. Placing or connecting iDRACs directly to the Internet could expose the connected system to security and other risks for which Dell is not responsible.
- Along with locating iDRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies such as firewalls, and limit access to the subnet/vLAN to authorized server administrators.
- Dell Technologies recommends that customers consider any deployment factors that may be relevant to their environment to assess their overall risk.
Link to remedies:
Customers can download iDRAC firmware for PowerEdge servers. For all other platforms, select the platform from the Dell support site.
Dell Technologies recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title, and non-infringement. In no event, shall Dell or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.