DSA-2022-156: Dell SmartFabric Storage Software Security Update for Multiple Component Vulnerabilities

Oversigt: Dell SmartFabric Storage Software remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Denne artikel gælder for Denne artikel gælder ikke for Denne artikel er ikke knyttet til et bestemt produkt. Det er ikke alle produktversioner, der er identificeret i denne artikel.

Virkning

High

Oplysninger

Proprietary Code CVE Description CVSS Base Score CVSS Vector String
CVE-2022-31232 SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVE Description CVSS Base Score CVSS Vector String
CVE-2022-31232 SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies anbefaler, at alle kunder tager hensyn til både CVSS-basisresultatet og alle relevante tidsmæssige og miljømæssige resultater, som kan have betydning for den potentielle alvorsgrad, der er forbundet med en bestemt sikkerhedsrisiko.

Berørte produkter og udbedring

CVEs Addressed Product Affected Version Updated Version Link to Update
CVE-2022-31232 SmartFabric Storage Software 1.0.0 1.1.0 https://www.dell.com/support/home/product-support/product/dell-emc-smartfabric-storage-software-trial/drivers
CVEs Addressed Product Affected Version Updated Version Link to Update
CVE-2022-31232 SmartFabric Storage Software 1.0.0 1.1.0 https://www.dell.com/support/home/product-support/product/dell-emc-smartfabric-storage-software-trial/drivers

Løsninger og afhjælpninger

If RADIUS and TACACS authentication is not a requirement, then customers can run the "rm /etc/ham/libnss_sac.enable" command to mitigate the vulnerability. If RADIUS and TACACS are a requirement, then customers must update.

Revisionshistorik

RevisionDateDescription
1.02022-07-19Initial Release

Relaterede oplysninger

Berørte produkter

SmartFabric OS10 Software

Produkter

Product Security Information
Artikelegenskaber
Artikelnummer: 000201667
Artikeltype: Dell Security Advisory
Senest ændret: 18 sep. 2025
Find svar på dine spørgsmål fra andre Dell-brugere
Supportservices
Kontrollér, om din enhed er dækket af supportservices.