Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Article Number: 000188318


DSA-2021-128: Dell PowerFlex Appliance Security Update for VMware vCenter Server Component Vulnerabilities

Summary: Dell PowerFlex Appliance remediation is available for VMware vCenter Server that may be exploited by malicious users to compromise the affected system.

Article Content


Impact

Critical

Details

Third-party Component
 
CVEs More information
VMware vCenter Server CVE-2021-21985 VMSA-2021-0010
CVE-2021-21986
Third-party Component
 
CVEs More information
VMware vCenter Server CVE-2021-21985 VMSA-2021-0010
CVE-2021-21986

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2021-21985
CVE-2021-21986
PowerFlex Appliance Versions before Intelligent_Catalog_37_361_00_r14, Versions before Intelligent_Catalog_37_355_00_r16 Intelligent_Catalog_37_361_00_r14, Intelligent_Catalog_37_355_00_r16 For IC downloads: https://www.dell.com/support/home/en-us/product-support/product/vxflex-appliance-sw/drivers
CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2021-21985
CVE-2021-21986
PowerFlex Appliance Versions before Intelligent_Catalog_37_361_00_r14, Versions before Intelligent_Catalog_37_355_00_r16 Intelligent_Catalog_37_361_00_r14, Intelligent_Catalog_37_355_00_r16 For IC downloads: https://www.dell.com/support/home/en-us/product-support/product/vxflex-appliance-sw/drivers

Workarounds and Mitigations

PowerFlex Appliance includes the updated vCenter versions containing the remediation in an upcoming release update. In the meantime, the following workaround is recommended for PowerFlex Appliance customers.

VMware’s recommended workaround is to temporarily disable the “VMware vSAN H5 client plug-in” for vCenter Server.

The procedure to disable the plug-in is outlined in the VMware KB article: https://kb.vmware.com/s/article/83829

Note:

  • The workaround is expected to be a temporary mitigation until the updated release is available.
  • Changes in the workaround must be reverted after applying the vCenter update. Procedure to revert the changes is outlined in https://kb.vmware.com/s/article/83829.
  • vSAN continues to function as expected, and vSAN related alarms continue to trigger for any events in the environment. These features are not dependent on the vSAN H5 plug-in.
  • The vSAN sections in the Monitoring and Configuration tabs in the vCenter UI are unavailable, and thus you cannot change the existing vSAN configuration.
  • The Skyline/vSAN Health UI interface is unavailable but the underlying logic monitoring the environment is still functional.
  • If there is a critical issue with vSAN, then the plug-in may need to be temporarily enabled to assist with troubleshooting and quicker resolution. When the issue is addressed, the plug-in can be disabled again. In this scenario, vCenter is exposed to the vulnerability as described in VMSA-2021-0010 while the plug-in is enabled.
Other references from VMware on this issue:
https://blogs.vmware.com/vsphere/2021/05/vmsa-2021-0010.html

Revision History

RevisionDateDescription
1.02021-06-14Initial release - Workarounds and Mitigations
2.02021-07-13Updated Affected Products and Remediation section to add Affected versions, Updated versions, and Link to Update information.  

Related Information

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide


The information in this Dell Technologies Security Advisory should be read and used to assist in avoiding situations that may arise from the problems described herein. Dell Technologies distributes Security Advisories to bring important security information to the attention of users of the affected product(s). Dell Technologies assesses the risk based on an average of risks across a diverse set of installed systems and may not represent the actual risk to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. The information set forth herein is provided "as is" without warranty of any kind. Dell Technologies expressly disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation shall apply to the extent permissible under law.

Article Properties


Affected Product

PowerFlex Appliance, Product Security Information, PowerFlex appliance R640, PowerFlex appliance R740XD, PowerFlex appliance R840

Last Published Date

25 Oct 2021

Version

3

Article Type

Dell Security Advisory