DSA-2024-178: Security Update for Dell VxRail 8.0.211 Multiple Third-Party Component Vulnerabilities
Summary: Dell VxRail remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-party Component | CVEs | More Information |
| VMware | CVE-2024-22275, CVE-2024-22274, CVE-2024-22273 | VMSA-2024-0011 |
Dell PowerEdge Intel Improper Parameter Initialization |
CVE-2024-0173, CVE-2024-0154 | DSA-2024-034 |
| Dell PowerEdge Intel Improper SMM Communication | CVE-2024-0161 | DSA-2024-006 |
| Dell PowerEdge Intel Improper SMM Communication | CVE-2024-0162 | DSA-2024-004 |
| Dell PowerEdge Intel TOCTOU | CVE-2024-0163 | DSA-2024-003 |
| Dell PowerEdge AMD-SN-3003 | CVE-2021-26344, CVE-2021-26387, CVE-2021-46772, CVE-2021-46746, CVE-2023-20518, CVE-2023-20578, CVE-2023-20584, CVE-2023-20591, CVE-2023-31356, CVE-2024-21981 | AMD-SN-3003 |
| Dell PowerEdge Intel Ethernet Controllers & Adapters | CVE-2023-39432, CVE-2023-33870, CVE-2023-29153 | DSA-2024-001 |
| Dell PowerEdge Intel Security Advisories (2024.1 IPU) | CVE-2023-39368, CVE-2023-38575, CVE-2023-35191, CVE-2023-32666, CVE-2023-32282, CVE-2023-22655, | DSA-2024-005 |
| Dell PowerEdge AMD | CVE-2023-31347, CVE-2023-31346 | DSA-2024-002 |
| Suse | CVE-2024-26622,CVE-2024-26607,CVE-2024-26603,CVE-2024-26602,CVE-2024-26598,CVE-2024-26595,CVE-2024-26593,CVE-2024-26591,CVE-2024-26589,CVE-2024-26586,CVE-2024-26585,CVE-2024-24860,CVE-2024-23851,CVE-2024-23850,CVE-2024-23849,CVE-2024-23653,CVE-2024-23652,CVE-2024-23651,CVE-2024-22667,CVE-2024-22365,CVE-2024-22232,CVE-2024-22231,CVE-2024-22029,CVE-2024-21626,CVE-2024-20952,CVE-2024-20945,CVE-2024-20926,CVE-2024-20921,CVE-2024-20919,CVE-2024-20918,CVE-2024-1597,CVE-2024-1151,CVE-2024-1086,CVE-2024-1085,CVE-2024-0985,CVE-2024-0775,CVE-2024-0727,CVE-2024-0641,CVE-2024-0607,CVE-2024-0565,CVE-2024-0340,CVE-2023-6932,CVE-2023-6931,CVE-2023-6918,CVE-2023-6915,CVE-2023-6817,CVE-2023-6622,CVE-2023-6610,CVE-2023-6606,CVE-2023-6597,CVE-2023-6546,CVE-2023-6536,CVE-2023-6535,CVE-2023-6531,CVE-2023-6516,CVE-2023-6356,CVE-2023-6270,CVE-2023-6121,CVE-2023-6040,CVE-2023-6004,CVE-2023-5752,CVE-2023-5679,CVE-2023-5517,CVE-2023-5388,CVE-2023-52559,CVE-2023-52531,CVE-2023-52530,CVE-2023-52484,CVE-2023-52482,CVE-2023-52478,CVE-2023-52475,CVE-2023-52467,CVE-2023-52464,CVE-2023-52463,CVE-2023-52457,CVE-2023-52456,CVE-2023-52452,CVE-2023-52451,CVE-2023-52449,CVE-2023-52448,CVE-2023-52447,CVE-2023-52445,CVE-2023-52443,CVE-2023-52439,CVE-2023-52429,CVE-2023-52340,CVE-2023-5197,CVE-2023-51782,CVE-2023-51780,CVE-2023-51779,CVE-2023-51764,CVE-2023-51385,CVE-2023-51043,CVE-2023-51042,CVE-2023-50868,CVE-2023-50387,CVE-2023-4921,CVE-2023-48795,CVE-2023-48706,CVE-2023-48237,CVE-2023-48236,CVE-2023-48235,CVE-2023-48234,CVE-2023-48233,CVE-2023-48232,CVE-2023-48231,CVE-2023-48161,CVE-2023-4750,CVE-2023-47233,CVE-2023-46838,CVE-2023-46589,CVE-2023-45648,CVE-2023-4408,CVE-2023-42795,CVE-2023-42794,CVE-2023-42465,CVE-2023-28746,CVE-2023-27043,CVE-2023-2283,CVE-2023-1667,CVE-2022-48627,CVE-2022-48566,CVE-2022-28506,CVE-2022-25236,CVE-2021-47083,CVE-2021-46934,CVE-2021-46932,CVE-2021-46924,CVE-2021-46923,CVE-2021-40633,CVE-2021-33631,CVE-2020-26558,CVE-2020-26555,CVE-2019-25162,,CVE-2024-26622,CVE-2024-26607,CVE-2024-26603,CVE-2024-26602,CVE-2024-26598,CVE-2024-26595,CVE-2024-26593,CVE-2024-26591,CVE-2024-26589,CVE-2024-26586,CVE-2024-26585,CVE-2024-24860,CVE-2024-23851,CVE-2024-23850,CVE-2024-23849,CVE-2024-23653,CVE-2024-23652,CVE-2024-23651,CVE-2024-22667,CVE-2024-22365,CVE-2024-22232,CVE-2024-22231,CVE-2024-22029,CVE-2024-21626,CVE-2024-20952,CVE-2024-20945,CVE-2024-20926,CVE-2024-20921,CVE-2024-20919,CVE-2024-20918,CVE-2024-1597,CVE-2024-1151,CVE-2024-1086,CVE-2024-1085,CVE-2024-0985,CVE-2024-0775,CVE-2024-0727,CVE-2024-0641,CVE-2024-0607,CVE-2024-0565,CVE-2024-0340,CVE-2023-6932,CVE-2023-6931,CVE-2023-6918,CVE-2023-6915,CVE-2023-6817,CVE-2023-6622,CVE-2023-6610,CVE-2023-6606,CVE-2023-6597,CVE-2023-6546,CVE-2023-6536,CVE-2023-6535,CVE-2023-6531,CVE-2023-6516,CVE-2023-6356,CVE-2023-6270,CVE-2023-6121,CVE-2023-6040,CVE-2023-6004,CVE-2023-5752,CVE-2023-5679,CVE-2023-5517,CVE-2023-5388,CVE-2023-52559,CVE-2023-52531,CVE-2023-52530,CVE-2023-52484,CVE-2023-52482,CVE-2023-52478,CVE-2023-52475,CVE-2023-52467,CVE-2023-52464,CVE-2023-52463,CVE-2023-52457,CVE-2023-52456,CVE-2023-52452,CVE-2023-52451,CVE-2023-52449,CVE-2023-52448,CVE-2023-52447,CVE-2023-52445,CVE-2023-52443,CVE-2023-52439,CVE-2023-52429,CVE-2023-52340,CVE-2023-5197,CVE-2023-51782,CVE-2023-51780,CVE-2023-51779,CVE-2023-51764,CVE-2023-51385,CVE-2023-51043,CVE-2023-51042,CVE-2023-50868,CVE-2023-50387,CVE-2023-4921,CVE-2023-48795,CVE-2023-48706,CVE-2023-48237,CVE-2023-48236,CVE-2023-48235,CVE-2023-48234,CVE-2023-48233,CVE-2023-48232,CVE-2023-48231,CVE-2023-48161,CVE-2023-4750,CVE-2023-47233,CVE-2023-46838,CVE-2023-46589,CVE-2023-45648,CVE-2023-4408,CVE-2023-42795,CVE-2023-42794,CVE-2023-42465,CVE-2023-28746,CVE-2023-27043,CVE-2023-2283,CVE-2023-1667,CVE-2022-48627,CVE-2022-48566,CVE-2022-28506,CVE-2022-25236,CVE-2021-47083,CVE-2021-46934,CVE-2021-46932,CVE-2021-46924,CVE-2021-46923,CVE-2021-40633,CVE-2021-33631,CVE-2020-26558,CVE-2020-26555,CVE-2019-25162 | SUSE.com |
Affected Products & Remediation
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell EMC VxRail Appliance | 8.0.x versions prior to 8.0.211 | 8.0.211 | Drivers & Downloads |
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell EMC VxRail Appliance | 8.0.x versions prior to 8.0.211 | 8.0.211 | Drivers & Downloads |
Revision History
| Revision | Date | Description |
| 1.0 | 2024-04-18 | Initial Release |
| 2.0 | 2024-06-13 | Added VMware Vulnerabilities |
| 3.0 | 2024-08-28 | Added AMD-SN-3003 |
Related Information
Legal Disclaimer
Affected Products
VxRail, CloudArray Virtual Edition for VxRail Appliance, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes
, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560, VxRail E560 VCF, VxRail E560F, VxRail E560F VCF, VxRail E560N, VxRail E560N VCF, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560 VCF, VxRail G560F, VxRail G560F VCF, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570 VCF, VxRail P570F, VxRail P570F VCF, VxRail P580N, VxRail P580N VCF, VxRail P670F, VxRail P670N, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S570 VCF, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570 VCF, VxRail V570F, VxRail V570F VCF, VXRAIL V670F, VxRail VD-4000R, VxRail VD-4000W, VxRail VD-4000Z, VxRail VD-4510C, VxRail VD-4520C, VxRail VD Series Nodes, VxRail VE-660, VxRail VE-6615, VxRail VP-760, VxRail VP-7625
...
Article Properties
Article Number: 000224302
Article Type: Dell Security Advisory
Last Modified: 19 Sept 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.