DSA-2021-194: Dell EMC CloudLink Security Update for Multiple Security Vulnerabilities
Shrnutí: Dell EMC CloudLink Security Update for multiple security vulnerabilities.
Tento článek se vztahuje na
Tento článek se nevztahuje na
Tento článek není vázán na žádný konkrétní produkt.
V tomto článku nejsou uvedeny všechny verze produktu.
Vliv
Critical
Podrobnosti
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2021-36312 | Dell EMC CloudLink 7.1 and all prior versions contain a Hard-coded Password Vulnerability. A remote high privileged attacker, with the knowledge of the hard-coded credentials, may potentially exploit this vulnerability to gain unauthorized access to the system. | 9.1 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2021-36313 | Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity. |
9.1 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2021-36314 | Dell EMC CloudLink 7.1 and all prior versions contain an Arbitrary File Creation Vulnerability. A remote unauthenticated attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary files on the end user system. | 7.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L |
| CVE-2021-36332 | Dell EMC CloudLink 7.1 and all prior versions contain a HTML and Javascript Injection Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, directing end user to arbitrary and potentially malicious websites. | 5.4 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
| CVE-2021-36333 | Dell EMC CloudLink 7.1 and all prior versions contain a Buffer Overflow Vulnerability. A local low privileged attacker, may potentially exploit this vulnerability, leading to an application crash. | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| CVE-2021-36334 | Dell EMC CloudLink 7.1 and all prior versions contain a CSV formula Injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to arbitrary code execution on end user machine | 5.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L |
| CVE-2021-36335 | Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, leading to execution of arbitrary files on the server | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
| Third-party Component |
CVEs | More information |
| Ubuntu 16.04 LTS: libxml2 vulnerabilities (USN-4991-1) | CVE-2021-3516 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2017-8872 | ||
| CVE-2020-24977 | ||
| CVE-2021-3541 | ||
| CVE-2021-3537 | ||
| CVE-2021-3517 | ||
| CVE-2021-3518 | ||
| CVE-2019-20388 | ||
| Ubuntu 16.04 LTS: LZ4 vulnerability (USN-4968-2) | CVE-2021-3520 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS: Intel Microcode vulnerabilities (USN-4985-1) | CVE-2020-24512 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2020-24513 | ||
| CVE-2020-24511 | ||
| CVE-2020-24489 | ||
| Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) | CVE-2021-31535 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) | CVE-2021-31535 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS: GNU C Library vulnerabilities (USN-4954-1) | CVE-2009-5155 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2020-6096 | ||
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04: Bind vulnerabilities (USN-4929-1) | CVE-2021-25215 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2021-25214 | ||
| CVE-2021-25216 | ||
| Ubuntu 16.04 LTS / 18.04 LTS: Linux kernel vulnerabilities (USN-4916-1) | CVE-2021-3493 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2021-29154 | ||
| Ubuntu 16.04 LTS: Linux kernel vulnerabilities (USN-4904-1) | CVE-2017-16644 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2019-16231 | ||
| CVE-2021-26930 | ||
| CVE-2021-28038 | ||
| CVE-2019-19061 | ||
| CVE-2021-26931 | ||
| CVE-2017-5967 | ||
| CVE-2015-1350 | ||
| CVE-2019-16232 | ||
| CVE-2021-20261 | ||
| CVE-2018-13095 | ||
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Nettle vulnerability (USN-4906-1) | CVE-2021-20305 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: curl vulnerabilities (USN-4898-1) | CVE-2021-22890 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2021-22876 | ||
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Bind vulnerability (USN-4737-1) | CVE-2020-8625 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| mbedtls | CVE-2018-0497 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2021-36312 | Dell EMC CloudLink 7.1 and all prior versions contain a Hard-coded Password Vulnerability. A remote high privileged attacker, with the knowledge of the hard-coded credentials, may potentially exploit this vulnerability to gain unauthorized access to the system. | 9.1 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2021-36313 | Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity. |
9.1 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2021-36314 | Dell EMC CloudLink 7.1 and all prior versions contain an Arbitrary File Creation Vulnerability. A remote unauthenticated attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary files on the end user system. | 7.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L |
| CVE-2021-36332 | Dell EMC CloudLink 7.1 and all prior versions contain a HTML and Javascript Injection Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, directing end user to arbitrary and potentially malicious websites. | 5.4 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
| CVE-2021-36333 | Dell EMC CloudLink 7.1 and all prior versions contain a Buffer Overflow Vulnerability. A local low privileged attacker, may potentially exploit this vulnerability, leading to an application crash. | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| CVE-2021-36334 | Dell EMC CloudLink 7.1 and all prior versions contain a CSV formula Injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to arbitrary code execution on end user machine | 5.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L |
| CVE-2021-36335 | Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, leading to execution of arbitrary files on the server | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
| Third-party Component |
CVEs | More information |
| Ubuntu 16.04 LTS: libxml2 vulnerabilities (USN-4991-1) | CVE-2021-3516 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2017-8872 | ||
| CVE-2020-24977 | ||
| CVE-2021-3541 | ||
| CVE-2021-3537 | ||
| CVE-2021-3517 | ||
| CVE-2021-3518 | ||
| CVE-2019-20388 | ||
| Ubuntu 16.04 LTS: LZ4 vulnerability (USN-4968-2) | CVE-2021-3520 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS: Intel Microcode vulnerabilities (USN-4985-1) | CVE-2020-24512 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2020-24513 | ||
| CVE-2020-24511 | ||
| CVE-2020-24489 | ||
| Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) | CVE-2021-31535 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) | CVE-2021-31535 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS: GNU C Library vulnerabilities (USN-4954-1) | CVE-2009-5155 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2020-6096 | ||
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04: Bind vulnerabilities (USN-4929-1) | CVE-2021-25215 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2021-25214 | ||
| CVE-2021-25216 | ||
| Ubuntu 16.04 LTS / 18.04 LTS: Linux kernel vulnerabilities (USN-4916-1) | CVE-2021-3493 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2021-29154 | ||
| Ubuntu 16.04 LTS: Linux kernel vulnerabilities (USN-4904-1) | CVE-2017-16644 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2019-16231 | ||
| CVE-2021-26930 | ||
| CVE-2021-28038 | ||
| CVE-2019-19061 | ||
| CVE-2021-26931 | ||
| CVE-2017-5967 | ||
| CVE-2015-1350 | ||
| CVE-2019-16232 | ||
| CVE-2021-20261 | ||
| CVE-2018-13095 | ||
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Nettle vulnerability (USN-4906-1) | CVE-2021-20305 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: curl vulnerabilities (USN-4898-1) | CVE-2021-22890 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| CVE-2021-22876 | ||
| Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Bind vulnerability (USN-4737-1) | CVE-2020-8625 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
| mbedtls | CVE-2018-0497 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Dotčené produkty a náprava
| Product | Affected Versions | Updated Version | Link to Update |
| Dell EMC CloudLink | Versions before 7.1.1 | 7.1.1 | https://www.dell.com/support/home/en-us/product-support/product/cloudlink-securevm/drivers |
Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
| Product | Affected Versions | Updated Version | Link to Update |
| Dell EMC CloudLink | Versions before 7.1.1 | 7.1.1 | https://www.dell.com/support/home/en-us/product-support/product/cloudlink-securevm/drivers |
Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
Historie změn
| Revision | Date | Description |
| 1.0 | 2021-11-01 | Initial Release |
Související informace
Právní upozornění
Dotčené produkty
CloudLinkProdukty
CloudLink SecureVM, Product Security InformationVlastnosti článku
Číslo článku: 000193031
Typ článku: Dell Security Advisory
Poslední úprava: 18 Sep 2025
Najděte odpovědi na své otázky od ostatních uživatelů společnosti Dell
Služby podpory
Zkontrolujte, zda se na vaše zařízení vztahují služby podpory.