Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

DSA-2021-164: Dell VNX2 Operating Environment for File Security Update for Multiple Vulnerabilities

Summary: Dell VNX2 Operating Environment for File contains remediation for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

Critical

Details

Proprietary
Code CVEs
Description CVSS Base
Score
CVSS Vector String
CVE-2021-36287 Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to run commands on the system. 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE-2021-36288 Dell VNX2 for File version 8.1.21.266 and earlier, contain a path traversal vulnerability which may lead unauthenticated users to read/write restricted files. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
CVE-2021-36289 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information.
 
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36290 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36293 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain elevated privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36294 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability leading to authentication bypass and complete takeover of the VNX system. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36295 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36296 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H


Note: The two vulnerabilities CVE-2021-36295 and CVE-2021-36296 were reported as a vulnerability chain with CVE-2021-36294. The cumulative score of the vulnerability chain: 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.

 
Third-party Component CVEs More Information
JRE  CVE-2021-3517 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
CVE-2021-35560
CVE-2021-35567
NTLM CVE-2021-31958
Proprietary
Code CVEs
Description CVSS Base
Score
CVSS Vector String
CVE-2021-36287 Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to run commands on the system. 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE-2021-36288 Dell VNX2 for File version 8.1.21.266 and earlier, contain a path traversal vulnerability which may lead unauthenticated users to read/write restricted files. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
CVE-2021-36289 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information.
 
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36290 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36293 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain elevated privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36294 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability leading to authentication bypass and complete takeover of the VNX system. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36295 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36296 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H


Note: The two vulnerabilities CVE-2021-36295 and CVE-2021-36296 were reported as a vulnerability chain with CVE-2021-36294. The cumulative score of the vulnerability chain: 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.

 
Third-party Component CVEs More Information
JRE  CVE-2021-3517 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
CVE-2021-35560
CVE-2021-35567
NTLM CVE-2021-31958
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Affected Versions Updated Versions Link to Update
VNX2 Version 8.1.21.266 (file), version 5.33.021.5.266 (block) and earlier Version 8.1.21.303 (file)
Version 5.33.021.5.303 (block)
Download and install the appropriate version by VNX2 code family: https://www.dell.com/support/home/en-us/product-support/product/vnxe1600/.
Product Affected Versions Updated Versions Link to Update
VNX2 Version 8.1.21.266 (file), version 5.33.021.5.266 (block) and earlier Version 8.1.21.303 (file)
Version 5.33.021.5.303 (block)
Download and install the appropriate version by VNX2 code family: https://www.dell.com/support/home/en-us/product-support/product/vnxe1600/.

Revision History

RevisionDateDescription
1.02021-09-01Initial release with workarounds
1.12022-03-31Updated CVEs and link to update.
1.22022-07-20Removed EMS Firmware CVE-2018-9086

Acknowledgements

Dell would like to thank Guillaume Quéré for reporting CVE-2021-36287, CVE-2021-36288, CVE-2021-36289, CVE-2021-36290, CVE-2021-36293, CVE-2021-36294, CVE-2021-36295, and CVE-2021-36296.

Related Information

Affected Products

Product Security Information, VNX VG10, VNX VG50, VNX2 Series, VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, VNX8000
Article Properties
Article Number: 000191155
Article Type: Dell Security Advisory
Last Modified: 02 Aug 2022
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.