DSA-2022-216: Dell Enterprise Hybrid Cloud Security Update for Multiple Third-Party Component Vulnerabilities

Shrnutí: Dell Enterprise Hybrid Cloud remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Tento článek se vztahuje na Tento článek se nevztahuje na Tento článek není vázán na žádný konkrétní produkt. V tomto článku nejsou uvedeny všechny verze produktu.

Vliv

Critical

Podrobnosti

Third-party Component CVE More information
VMware vRealize Operations CVE-2022-31672 VMSA-2022-0022
CVE-2022-31673
CVE-2022-31674
CVE-2022-31675
VMware vRealize Automation CVE-2022-31656 VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-31657
CVE-2022-31658
CVE-2022-31659
CVE-2022-31660
CVE-2022-31661
CVE-2022-31662
CVE-2022-31663
CVE-2022-31664
CVE-2022-31665
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-29901 VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-28693
CVE-2022-23816
CVE-2022-23825
VMware vRealize Log Insight 8.x CVE-2022-31654 VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version.
CVE-2022-31655
VMware Server (6.5, 6.7, and 7.0) CVE-2022-22982 VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available.
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-21123 VMSA-2022-0016, see KB articles for workarounds and fixes.
CVE-2022-21125
CVE-2022-21166


See the security advisories that are listed in the table above for details on vulnerabilities and remediation.

Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Third-party Component CVE More information
VMware vRealize Operations CVE-2022-31672 VMSA-2022-0022
CVE-2022-31673
CVE-2022-31674
CVE-2022-31675
VMware vRealize Automation CVE-2022-31656 VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-31657
CVE-2022-31658
CVE-2022-31659
CVE-2022-31660
CVE-2022-31661
CVE-2022-31662
CVE-2022-31663
CVE-2022-31664
CVE-2022-31665
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-29901 VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-28693
CVE-2022-23816
CVE-2022-23825
VMware vRealize Log Insight 8.x CVE-2022-31654 VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version.
CVE-2022-31655
VMware Server (6.5, 6.7, and 7.0) CVE-2022-22982 VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available.
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-21123 VMSA-2022-0016, see KB articles for workarounds and fixes.
CVE-2022-21125
CVE-2022-21166


See the security advisories that are listed in the table above for details on vulnerabilities and remediation.

Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Společnost Dell Technologies všem zákazníkům doporučuje vzít v úvahu základní hodnocení CVSS i všechna související hodnocení v daném čase a prostředí, která mohou mít vliv na potenciální závažnost dané konkrétní bezpečnostní hrozby.

Dotčené produkty a náprava

Product Affected Versions Updated Versions
Dell Enterprise Hybrid Cloud Versions before 4.1.2 4.1.2

The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
  • Dell Enterprise Hybrid Cloud version 4.1.2

Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.

Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.

ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Product Affected Versions Updated Versions
Dell Enterprise Hybrid Cloud Versions before 4.1.2 4.1.2

The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
  • Dell Enterprise Hybrid Cloud version 4.1.2

Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.

Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.

ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.

Historie změn

RevisionDateDescription
1.02022-08-10Initial Release

Související informace

Dotčené produkty

Enterprise Hybrid Cloud, Enterprise Hybrid Cloud, Federation End User Computing Solution for Federation Enterprise Hybrid Cloud, Product Security Information
Vlastnosti článku
Číslo článku: 000202365
Typ článku: Dell Security Advisory
Poslední úprava: 19 Sep 2025
Najděte odpovědi na své otázky od ostatních uživatelů společnosti Dell
Služby podpory
Zkontrolujte, zda se na vaše zařízení vztahují služby podpory.