Impact
Critical
Details
Third-party Component |
CVE |
More information |
VMware vRealize Operations |
CVE-2022-31672 |
VMSA-2022-0022 |
CVE-2022-31673 |
CVE-2022-31674 |
CVE-2022-31675 |
VMware vRealize Automation |
CVE-2022-31656 |
VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31657 |
CVE-2022-31658 |
CVE-2022-31659 |
CVE-2022-31660 |
CVE-2022-31661 |
CVE-2022-31662 |
CVE-2022-31663 |
CVE-2022-31664 |
CVE-2022-31665 |
VMware ESXi (6.5, 6.7, and 7.0) |
CVE-2022-29901 |
VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-28693 |
CVE-2022-23816 |
CVE-2022-23825 |
VMware vRealize Log Insight 8.x |
CVE-2022-31654 |
VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
CVE-2022-31655 |
VMware Server (6.5, 6.7, and 7.0) |
CVE-2022-22982 |
VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
VMware ESXi (6.5, 6.7, and 7.0) |
CVE-2022-21123 |
VMSA-2022-0016, see KB articles for workarounds and fixes. |
CVE-2022-21125 |
CVE-2022-21166 |
See the security advisories that are listed in the table above for details on vulnerabilities and remediation.
Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Third-party Component |
CVE |
More information |
VMware vRealize Operations |
CVE-2022-31672 |
VMSA-2022-0022 |
CVE-2022-31673 |
CVE-2022-31674 |
CVE-2022-31675 |
VMware vRealize Automation |
CVE-2022-31656 |
VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31657 |
CVE-2022-31658 |
CVE-2022-31659 |
CVE-2022-31660 |
CVE-2022-31661 |
CVE-2022-31662 |
CVE-2022-31663 |
CVE-2022-31664 |
CVE-2022-31665 |
VMware ESXi (6.5, 6.7, and 7.0) |
CVE-2022-29901 |
VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-28693 |
CVE-2022-23816 |
CVE-2022-23825 |
VMware vRealize Log Insight 8.x |
CVE-2022-31654 |
VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
CVE-2022-31655 |
VMware Server (6.5, 6.7, and 7.0) |
CVE-2022-22982 |
VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
VMware ESXi (6.5, 6.7, and 7.0) |
CVE-2022-21123 |
VMSA-2022-0016, see KB articles for workarounds and fixes. |
CVE-2022-21125 |
CVE-2022-21166 |
See the security advisories that are listed in the table above for details on vulnerabilities and remediation.
Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.
Product |
Affected Versions |
Updated Versions |
Dell Enterprise Hybrid Cloud |
Versions before 4.1.2 |
4.1.2 |
The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
- Dell Enterprise Hybrid Cloud version 4.1.2
Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Product |
Affected Versions |
Updated Versions |
Dell Enterprise Hybrid Cloud |
Versions before 4.1.2 |
4.1.2 |
The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
- Dell Enterprise Hybrid Cloud version 4.1.2
Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Revision History
Revision | Date | Description |
1.0 | 2022-08-10 | Initial Release |
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
Affected Products
Enterprise Hybrid Cloud, Enterprise Hybrid Cloud, Federation End User Computing Solution for Federation Enterprise Hybrid Cloud, Product Security Information