Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Article Number: 000218139


DSA-2023-320: Security Update for Dell VxRail Multiple Vulnerabilities – 7.0.480

Summary: Dell VxRail remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Article Content


Impact

Critical

Details

Third-Party Component CVEs More Information
Dell PowerEdge BIOS CVE-2023-32461, CVE-2023-0215, CVE-2023-0286, CVE-2022-4304, CVE-2022-4450, CVE-2023-25537, CVE-2022-33894, CVE-2022-38087, CVE-2022-40982, CVE-2022-38083, CVE-2022-43505, CVE-2023-23908, CVE-2022-41804, CVE-2021-38578, CVE-2024-0172 DSA-2023-134, DSA-2023-098DSA-2023-096, DSA-2023-206, DSA-2023-097DSA-2024-035
Dell PowerEdge Intel E810 Series Firmware CVE-2023-22276, CVE-2023-25775 DSA-2023-208
Dell PowerEdge Intel E810 Series Firmware CVE-2023-28376 DSA-2023-378
Dell PowerEdge AMD BIOS  CVE-2023-20566, CVE-2023-20533, CVE-2023-20526, CVE-2023-20521, CVE-2023-20519, CVE-2022-23830, CVE-2022-23820, CVE-2021-46774, CVE-2021-46766, CVE-2021-26345 DSA-2023-355
OpenSSL CVE-2023-2650 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
OpenSSH CVE-2023-38408, CVE-2016-20012 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
PostgreSQL CVE-2023-2454, CVE-2023-2455 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
VMware vCenter CVE-2023-34048, CVE-2023-34056 For more information, see
VMSA-2023-0023
Python Celery CVE-2021-23727 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
SUSE CVE-2023-4156,CVE-2023-4004,CVE-2023-39418,CVE-2023-39417,CVE-2023-38408,CVE-2023-3817,CVE-2023-3812,CVE-2023-3776,CVE-2023-3611,CVE-2023-3609,CVE-2023-36054,CVE-2023-35829,CVE-2023-35828,CVE-2023-35824,CVE-2023-35823,CVE-2023-35788,CVE-2023-3567,CVE-2023-35001,CVE-2023-34969,CVE-2023-3446,CVE-2023-3390,CVE-2023-3389,CVE-2023-3358,CVE-2023-3357,CVE-2023-3338,CVE-2023-33288,CVE-2023-32681,CVE-2023-3268,CVE-2023-32461,CVE-2023-32269,CVE-2023-32233,CVE-2023-3212,CVE-2023-32001,CVE-2023-3161,CVE-2023-3159,CVE-2023-31484,CVE-2023-31436,CVE-2023-3141,CVE-2023-3138,CVE-2023-31248,CVE-2023-3117,CVE-2023-3111,CVE-2023-31084,CVE-2023-31083,CVE-2023-3090,CVE-2023-30772,CVE-2023-30630,CVE-2023-30456,CVE-2023-3006,CVE-2023-2985,CVE-2023-2975,CVE-2023-2953,CVE-2023-29491,CVE-2023-29469,CVE-2023-29383,CVE-2023-2911,CVE-2023-28772,CVE-2023-28709,CVE-2023-28708,CVE-2023-28642,CVE-2023-2860,CVE-2023-28487,CVE-2023-28486,CVE-2023-28484,CVE-2023-28466,CVE-2023-28464,CVE-2023-28410,CVE-2023-28370,CVE-2023-28328,CVE-2023-28327,CVE-2023-28322,CVE-2023-28321,CVE-2023-28320,CVE-2023-28319,CVE-2023-2828,CVE-2023-27561,CVE-2023-27538,CVE-2023-27536,CVE-2023-27535,CVE-2023-27534,CVE-2023-27533,CVE-2023-27320,CVE-2023-26555,CVE-2023-26554,CVE-2023-26553,CVE-2023-26552,CVE-2023-26551,CVE-2023-26545,CVE-2023-2650,CVE-2023-2610,CVE-2023-2609,CVE-2023-2603,CVE-2023-2602,CVE-2023-25809,CVE-2023-25775,CVE-2023-25537,CVE-2023-25193,CVE-2023-25180,CVE-2023-25173,CVE-2023-25153,CVE-2023-2513,CVE-2023-25012,CVE-2023-24998,CVE-2023-2483,CVE-2023-24593,CVE-2023-2455,CVE-2023-2454,CVE-2023-24329,CVE-2023-2426,CVE-2023-23931,CVE-2023-23586,CVE-2023-23559,CVE-2023-23006,CVE-2023-23004,CVE-2023-23001,CVE-2023-23000,CVE-2023-22998,CVE-2023-22995,CVE-2023-2269,CVE-2023-2235,CVE-2023-22276,CVE-2023-22049,CVE-2023-22045,CVE-2023-22044,CVE-2023-22041,CVE-2023-22036,CVE-2023-22006,CVE-2023-21968,CVE-2023-21967,CVE-2023-21954,CVE-2023-2194,CVE-2023-21939,CVE-2023-21938,CVE-2023-21937,CVE-2023-21930,CVE-2023-21843,CVE-2023-21835,CVE-2023-2176,CVE-2023-2166,CVE-2023-2162,CVE-2023-2156,CVE-2023-21400,CVE-2023-2124,CVE-2023-21102,CVE-2023-20867,CVE-2023-20593,CVE-2023-20569,CVE-2023-2019,CVE-2023-2008,CVE-2023-2002,CVE-2023-1998,CVE-2023-1990,CVE-2023-1989,CVE-2023-1981,CVE-2023-1872,CVE-2023-1855,CVE-2023-1838,CVE-2023-1829,CVE-2023-1670,CVE-2023-1652,CVE-2023-1637,CVE-2023-1611,CVE-2023-1582,CVE-2023-1513,CVE-2023-1410,CVE-2023-1390,CVE-2023-1387,CVE-2023-1382,CVE-2023-1380,CVE-2023-1355,CVE-2023-1281,CVE-2023-1264,CVE-2023-1255,CVE-2023-1249,CVE-2023-1195,CVE-2023-1175,CVE-2023-1170,CVE-2023-1127,CVE-2023-1118,CVE-2023-1095,CVE-2023-1079,CVE-2023-1078,CVE-2023-1077,CVE-2023-1076,CVE-2023-1075,CVE-2023-0922,CVE-2023-0687,CVE-2023-0597,CVE-2023-0590,CVE-2023-0512,CVE-2023-0466,CVE-2023-0465,CVE-2023-0464,CVE-2023-0461,CVE-2023-0459,CVE-2023-0394,CVE-2023-0386,CVE-2023-0361,CVE-2023-0286,CVE-2023-0215,CVE-2023-0045,CVE-2022-4904,CVE-2022-4899,CVE-2022-48303,CVE-2022-4744,CVE-2022-46908,CVE-2022-46146,CVE-2022-45919,CVE-2022-45887,CVE-2022-45886,CVE-2022-45885,CVE-2022-45884,CVE-2022-45143,CVE-2022-45061,CVE-2022-4450,CVE-2022-43945,CVE-2022-4304,CVE-2022-4269,CVE-2022-41862,CVE-2022-41715,CVE-2022-40982,CVE-2022-40735,CVE-2022-38096,CVE-2022-38087,CVE-2022-37026,CVE-2022-36280,CVE-2022-36109,CVE-2022-36062,CVE-2022-35957,CVE-2022-3566,CVE-2022-3555,CVE-2022-3523,CVE-2022-33894,CVE-2022-32149,CVE-2022-3171,CVE-2022-31107,CVE-2022-31097,CVE-2022-29824,CVE-2022-28737,CVE-2022-27664,CVE-2022-23471,CVE-2022-2196,CVE-2022-1941,CVE-2022-0185,CVE-2022-0155,CVE-2021-43138,CVE-2021-3923,CVE-2021-3918,CVE-2021-38578,CVE-2021-3807,CVE-2021-3541,CVE-2021-3246,CVE-2021-30560,CVE-2021-30465,CVE-2021-29650,CVE-2021-22570,CVE-2021-22569,CVE-2020-7753,CVE-2020-36694,CVE-2020-36691,CVE-2020-36242,CVE-2020-25659,CVE-2020-23903,CVE-2020-12762,CVE-2019-20916,CVE-2019-19921,CVE-2019-15133,CVE-2018-13139,CVE-2018-11490,CVE-2018-1000518,CVE-2017-5753,CVE-2016-3977,CVE-2016-20012,CVE-2007-4559 For more information,
see the SUSE Website
https://www.suse.com/security/cve/This hyperlink is taking you to a website outside of Dell Technologies.

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-32463 Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:LThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-32463 Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:LThis hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

Product Affected Versions Remediated Versions Link
Dell EMC VxRail Appliance Versions prior to 7.0.480 Version 7.0.480 VxRail 7.0.480
Product Affected Versions Remediated Versions Link
Dell EMC VxRail Appliance Versions prior to 7.0.480 Version 7.0.480 VxRail 7.0.480

Revision History

RevisionDateDescription
1.02023-10-12Initial Release
2.02023-10-13Updated for enhanced presentation with no changes to content.
3.02023-10-27Amended to add CVE remediated in VMSA-2023-0023
4.02023-11-22Amended for Intel firmware and  PowerEdge BIOS AMD vulnerabilities
5.02024-04-11Added CVE-2024-0172
6.02024-04-11Updated for enhanced presentation with no change to content.

Related Information


Article Properties


Affected Product
VxRail, CloudArray Virtual Edition for VxRail Appliance, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes , VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560, VxRail E560 VCF, VxRail E560F, VxRail E560F VCF, VxRail E560N, VxRail E560N VCF, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560 VCF, VxRail G560F, VxRail G560F VCF, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570 VCF, VxRail P570F, VxRail P570F VCF, VxRail P580N, VxRail P580N VCF, VXRAIL P670F, VxRail P670N, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S570 VCF, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570 VCF, VxRail V570F, VxRail V570F VCF, VXRAIL V670F, VxRail VD-4000R, VxRail VD-4000W, VxRail VD-4000Z, VxRail VD-4510C, VxRail VD-4520C, VxRail VD Series Nodes, VxRail VE-660, VxRail VP-760 ...
Last Published Date

11 Apr 2024

Version

10

Article Type

Dell Security Advisory