Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

DSA-2022-022: Dell EMC VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Summary: Dell EMC VxRail remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Impact

Critical

Details

Third-party Component CVEs More Information
VMware vCenter CVE-2021-44832 Apache Log4j
VMSA-2021-0028
DSN-2021-007
DSA-2021-265
CVE-2021-45105
CVE-2021-44228
CVE-2021-45046
CVE-2021-40438 Apache HTTPD
   
VMware ESXi CVE-2021-22045 VMSA-2022-0001 - Heap Overflow Vulnerability
VxM SUSE
Vulnerabilities
CVE-2016-10228  
CVE-2018-13139
CVE-2018-14679
CVE-2018-14681
CVE-2018-14682
CVE-2018-19432
CVE-2018-19758
CVE-2019-20838
CVE-2020-12049
CVE-2020-12825
CVE-2020-14155
CVE-2020-23903
CVE-2020-26137
CVE-2020-29361
CVE-2020-3702
CVE-2020-8927
CVE-2021-0941
CVE-2021-20266
CVE-2021-20271
CVE-2021-20294
CVE-2021-20322
CVE-2021-21781
CVE-2021-21996
CVE-2021-22543
CVE-2021-22946
CVE-2021-22947
CVE-2021-23214
CVE-2021-2341
CVE-2021-2369
CVE-2021-2388
CVE-2021-23222
CVE-2021-30465
CVE-2021-31810
CVE-2021-31916
CVE-2021-3246
CVE-2021-32760
CVE-2021-33574
CVE-2021-33910
CVE-2021-3421
CVE-2021-3426
CVE-2021-34556
CVE-2021-34981
CVE-2021-35477
CVE-2021-35550
CVE-2021-35556
CVE-2021-35559
CVE-2021-35561
CVE-2021-35564
CVE-2021-35565
CVE-2021-35567
CVE-2021-35578
CVE-2021-35586
CVE-2021-35603
CVE-2021-3572
CVE-2021-35942
CVE-2021-36222
CVE-2021-3640
CVE-2021-3653
CVE-2021-3656
CVE-2021-3659
CVE-2021-3669
CVE-2021-3677
CVE-2021-3679
CVE-2021-3711
CVE-2021-3712
CVE-2021-37159
CVE-2021-3732
CVE-2021-3733
CVE-2021-3737
CVE-2021-3739
CVE-2021-3743
CVE-2021-3744
CVE-2021-3752
CVE-2021-3753
CVE-2021-37576
CVE-2021-3759
CVE-2021-37600
CVE-2021-3764
CVE-2021-37750
CVE-2021-38160
CVE-2021-38198
CVE-2021-38204
CVE-2021-38205
CVE-2021-38207
CVE-2021-39537
CVE-2021-40490
CVE-2021-4104
CVE-2021-41089
CVE-2021-41091
CVE-2021-41092
CVE-2021-41103
CVE-2021-41990
CVE-2021-41991
CVE-2021-43389
  CVE-2021-43527  
CVE-2021-43618
CVE-2021-43784

Note: Since the version of some OSS packages in vCenter Server 6.5 Update 3r and vCenter Server 6.7 Update 3p is later than the version in vCenter Server 7.0 Update 3c, upgrades from VxRail 4.5.470 and 4.7.540 to 7.0.320 may expose the system to the following vulnerabilities:
  • Apache Tomcat: CVE-2021-41079 (7.5), CVE-2021-30639 (7.5), CVE-2021-30640 (6.5), CVE-2021-33037 (5.3)
  • Eclipse Jetty: CVE-2021-34429 (5.0), CVE-2021-34428 (3.6), CVE-2021-28169 (5.0)
  • cURL: CVE-2021-22897 (5.3), CVE-2021-22926 (7.5), CVE-2021-22925 (5.3), CVE-2021-22924 (3.7), CVE-2021-22923 (5.3), CVE-2021-22922 (6.5)
  • OpenSSL library: CVE-2021-3712 (7.4)
  • Oracle (Sun) JRE and JDK: CVE-2021-2388 (5.1), CVE-2021-2163 (2.6), CVE-2021-2161 (4.3)
  • SQLite: CVE-2021-20227 (5.5)
This is a known VMware vSphere issue. An updated version of the affected OSS packages comes with a future vCenter Server 7.x release. For more information, see VMware vCenter Server 7.0 Update 3c Release Notes.
Third-party Component CVEs More Information
VMware vCenter CVE-2021-44832 Apache Log4j
VMSA-2021-0028
DSN-2021-007
DSA-2021-265
CVE-2021-45105
CVE-2021-44228
CVE-2021-45046
CVE-2021-40438 Apache HTTPD
   
VMware ESXi CVE-2021-22045 VMSA-2022-0001 - Heap Overflow Vulnerability
VxM SUSE
Vulnerabilities
CVE-2016-10228  
CVE-2018-13139
CVE-2018-14679
CVE-2018-14681
CVE-2018-14682
CVE-2018-19432
CVE-2018-19758
CVE-2019-20838
CVE-2020-12049
CVE-2020-12825
CVE-2020-14155
CVE-2020-23903
CVE-2020-26137
CVE-2020-29361
CVE-2020-3702
CVE-2020-8927
CVE-2021-0941
CVE-2021-20266
CVE-2021-20271
CVE-2021-20294
CVE-2021-20322
CVE-2021-21781
CVE-2021-21996
CVE-2021-22543
CVE-2021-22946
CVE-2021-22947
CVE-2021-23214
CVE-2021-2341
CVE-2021-2369
CVE-2021-2388
CVE-2021-23222
CVE-2021-30465
CVE-2021-31810
CVE-2021-31916
CVE-2021-3246
CVE-2021-32760
CVE-2021-33574
CVE-2021-33910
CVE-2021-3421
CVE-2021-3426
CVE-2021-34556
CVE-2021-34981
CVE-2021-35477
CVE-2021-35550
CVE-2021-35556
CVE-2021-35559
CVE-2021-35561
CVE-2021-35564
CVE-2021-35565
CVE-2021-35567
CVE-2021-35578
CVE-2021-35586
CVE-2021-35603
CVE-2021-3572
CVE-2021-35942
CVE-2021-36222
CVE-2021-3640
CVE-2021-3653
CVE-2021-3656
CVE-2021-3659
CVE-2021-3669
CVE-2021-3677
CVE-2021-3679
CVE-2021-3711
CVE-2021-3712
CVE-2021-37159
CVE-2021-3732
CVE-2021-3733
CVE-2021-3737
CVE-2021-3739
CVE-2021-3743
CVE-2021-3744
CVE-2021-3752
CVE-2021-3753
CVE-2021-37576
CVE-2021-3759
CVE-2021-37600
CVE-2021-3764
CVE-2021-37750
CVE-2021-38160
CVE-2021-38198
CVE-2021-38204
CVE-2021-38205
CVE-2021-38207
CVE-2021-39537
CVE-2021-40490
CVE-2021-4104
CVE-2021-41089
CVE-2021-41091
CVE-2021-41092
CVE-2021-41103
CVE-2021-41990
CVE-2021-41991
CVE-2021-43389
  CVE-2021-43527  
CVE-2021-43618
CVE-2021-43784

Note: Since the version of some OSS packages in vCenter Server 6.5 Update 3r and vCenter Server 6.7 Update 3p is later than the version in vCenter Server 7.0 Update 3c, upgrades from VxRail 4.5.470 and 4.7.540 to 7.0.320 may expose the system to the following vulnerabilities:
  • Apache Tomcat: CVE-2021-41079 (7.5), CVE-2021-30639 (7.5), CVE-2021-30640 (6.5), CVE-2021-33037 (5.3)
  • Eclipse Jetty: CVE-2021-34429 (5.0), CVE-2021-34428 (3.6), CVE-2021-28169 (5.0)
  • cURL: CVE-2021-22897 (5.3), CVE-2021-22926 (7.5), CVE-2021-22925 (5.3), CVE-2021-22924 (3.7), CVE-2021-22923 (5.3), CVE-2021-22922 (6.5)
  • OpenSSL library: CVE-2021-3712 (7.4)
  • Oracle (Sun) JRE and JDK: CVE-2021-2388 (5.1), CVE-2021-2163 (2.6), CVE-2021-2161 (4.3)
  • SQLite: CVE-2021-20227 (5.5)
This is a known VMware vSphere issue. An updated version of the affected OSS packages comes with a future vCenter Server 7.x release. For more information, see VMware vCenter Server 7.0 Update 3c Release Notes.

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 7.0.x versions before 7.0.320 7.0.320

Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 7.0.x versions before 7.0.320 7.0.320

Workarounds and Mitigations

Third-party Component CVE Fixed Version Workarounds More Information
VMware vCenter CVE-2021-22048 Patch Pending VMware article KB86292 VMSA-2021-0025

Revision History

RevisionDateDescription
1.02022-02-01Initial Release
1.12022-02-28Added SUSE CVEs
1.22022-03-04CVE-2021-22048 moved to Workarounds and Mitigations Section


 

Related Information

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide


The information in this Dell Technologies Security Advisory should be read and used to assist in avoiding situations that may arise from the problems described herein. Dell Technologies distributes Security Advisories to bring important security information to the attention of users of the affected product(s). Dell Technologies assesses the risk based on an average of risks across a diverse set of installed systems and may not represent the actual risk to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. The information set forth herein is provided "as is" without warranty of any kind. Dell Technologies expressly disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation shall apply to the extent permissible under law.

Article Properties


Affected Product

VxRail, CloudArray Virtual Edition for VxRail Appliance, Product Security Information, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance SeriesVxRail, CloudArray Virtual Edition for VxRail Appliance, Product Security Information, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, Dell EMC VxRail E560, VxRail E560 VCF, Dell EMC VxRail E560F, VxRail E560F VCF, VxRail E560N, VxRail E560N VCF, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560 VCF, VxRail G560F, VxRail G560F VCF, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, Dell EMC VxRail P570, VxRail P570 VCF, Dell EMC VxRail P570F, VxRail P570F VCF, VxRail P580N, VxRail P580N VCF, VXRAIL P670F, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, Dell EMC VxRail S570, VxRail S570 VCF, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, Dell EMC VxRail V570, VxRail V570 VCF, Dell EMC VxRail V570F, VxRail V570F VCF, VXRAIL V670FSee more

Last Published Date

04 Mar 2022

Version

5

Article Type

Dell Security Advisory