Article Number: 000197693
High
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2021-36339 | The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts. A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance. Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226. Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity. |
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Third-party Component | CVEs | More information |
SUSE Linux Enterprise Server 12 SP5 | See SUSE Security Advisories. | See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories. SUSE-SU-2022:0030-1, SUSE-SU-2022:0189-1: CVE-2021-4034 polkit fixes, SUSE-SU-2021:4060-1, SUSE-SU-2021:4004-1, SUSE-SU-2021:3951-1, SUSE-SU-2021:3935-1, SUSE-SU-2021:3878-1, SUSE-SU-2021:3877-1, SUSE-SU-2021:3875-1, SUSE-SU-2021:3859-1, SUSE-SU-2021:3853-1, SUSE-SU-2021:3837-1, SUSE-SU-2021:3748-1, SUSE-SU-2021:3657-1, SUSE-SU-2021:3652-1, SUSE-SU-2021:3611-1, SUSE-SU-2021:3524-1, SUSE-SU-2021:3502-1, SUSE-SU-2021:3491-1, SUSE-SU-2021:3486-1, SUSE-SU-2021:3477-1, SUSE-SU-2021:3475-1, SUSE-SU-2021:3463-1, SUSE-SU-2021:3452-1, SUSE-SU-2021:3237-1, SUSE-SU-2021:3144-1, SUSE-SU-2021:2930-1, SUSE-SU-2021:2876-1, SUSE-SU-2021:2825-1, SUSE-SU-2021:2423-1, SUSE-SU-2021:1621-1, SUSE-SU-2021:0886-1, SUSE-SU-2021:0794-1, SUSE-SU-2021:0432-1, SUSE-SU-2021:0344-1, SUSE-SU-2020:3765-1, SUSE-SU-2020:3596-1, SUSE-SU-2020:3262-1, SUSE-SU-2020:3121-1, SUSE-SU-2020:2699-1, SUSE-SU-2020:2275-1, SUSE-SU-2020:1839-1, SUSE-SU-2020:1732-1, SUSE-SU-2020:1662-1, SUSE-SU-2020:1612-1, SUSE-SU-2020:1570-1, SUSE-SU-2020:1550-1, SUSE-SU-2020:1534-1, SUSE-SU-2020:1524-1, SUSE-SU-2020:1180-1, SUSE-SU-2020:0854-1, SUSE-SU-2020:0630-1, SUSE-SU-2020:0545-1, SUSE-SU-2020:0497-1, SUSE-SU-2020:0457-1, SUSE-SU-2020:0410-1, SUSE-SU-2020:0331-1, SUSE-SU-2020:0088-1, SUSE-SU-2019:3180-1, SUSE-SU-2019:3060-2, SUSE-SU-2019:2972-1, SUSE-SU-2019:2941-1, SUSE-SU-2019:2936-1, SUSE-SU-2019:2798-1, SUSE-SU-2019:2781-1, SUSE-SU-2019:2669-1, SUSE-SU-2019:2339-2, SUSE-SU-2019:2265-1, SUSE-SU-2019:2264-1, SUSE-SU-2019:2013-1, SUSE-SU-2019:1972-1, SUSE-SU-2019:1955-1, SUSE-SU-2019:1733-1, SUSE-SU-2019:1645-1, SUSE-SU-2019:1606-2, SUSE-SU-2019:1606-1, SUSE-SU-2019:1468-1, SUSE-SU-2019:1456-1, SUSE-SU-2019:1379-1, SUSE-SU-2019:1363-1, SUSE-SU-2019:1265-1, SUSE-SU-2019:1166-1, SUSE-SU-2019:1111-1, SUSE-SU-2019:1091-1, SUSE-SU-2019:1060-1, SUSE-SU-2019:0996-1, SUSE-SU-2019:0956-1, SUSE-SU-2019:0839-1, SUSE-SU-2019:0838-1, SUSE-SU-2019:0776-1, SUSE-SU-2019:0747-1, SUSE-SU-2019:0655-1, SUSE-SU-2019:0450-1, SUSE-SU-2019:0428-1, SUSE-SU-2019:0249-1, SUSE-SU-2019:0209-1, SUSE-SU-2019:0135-1, SUSE-SU-2018:4191-1, SUSE-SU-2018:4149-1, SUSE-SU-2018:3967-1, SUSE-SU-2018:3926-1, SUSE-SU-2018:3911-1, SUSE-SU-2018:3884-1, SUSE-SU-2018:3767-1, SUSE-SU-2018:3640-1, SUSE-SU-2018:3608-1, SUSE-SU-2018:3545-1, SUSE-SU-2018:3447-1, SUSE-SU-2018:3289-1, SUSE-SU-2018:3286-1, SUSE-SU-2018:3219-1, SUSE-SU-2018:3066-1, SUSE-SU-2018:2991-1, SUSE-SU-2018:2978-1, SUSE-SU-2018:2842-1, SUSE-SU-2018:2841-1, SUSE-SU-2018:2837-1, SUSE-SU-2018:2836-1, SUSE-SU-2018:2835-1, SUSE-SU-2018:2814-1, SUSE-SU-2018:2779-1, SUSE-SU-2018:2715-1, SUSE-SU-2018:2451-2, SUSE-SU-2018:2204-1, SUSE-SU-2018:2171-1, SUSE-SU-2018:2145-1, SUSE-SU-2018:2071-1, SUSE-SU-2018:2038-1, SUSE-SU-2018:1997-1, SUSE-SU-2018:1972-1, SUSE-SU-2018:1950-1, SUSE-SU-2018:1836-1, SUSE-SU-2018:1826-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:1401-1, SUSE-SU-2018:1398-1, SUSE-SU-2018:1373-1, SUSE-SU-2018:1327-1, SUSE-SU-2018:1288-1, SUSE-SU-2018:1195-1, SUSE-SU-2018:1180-1, SUSE-SU-2018:1074-1, SUSE-SU-2018:0926-1, SUSE-SU-2018:0878-1, SUSE-SU-2018:0858-1, SUSE-SU-2018:0769-1, SUSE-SU-2018:0673-1, SUSE-SU-2018:0662-1, SUSE-SU-2018:0650-1, SUSE-SU-2018:0546-1, SUSE-SU-2018:0510-1, SUSE-SU-2018:0373-1, SUSE-SU-2018:0337-1, SUSE-SU-2018:0299-1, SUSE-SU-2018:0295-1, SUSE-SU-2018:0284-1, SUSE-SU-2018:0260-1, SUSE-SU-2018:0217-1, SUSE-SU-2018:0200-1, SUSE-SU-2018:0193-1, SUSE-SU-2018:0181-1, SUSE-SU-2018:0173-1, SUSE-SU-2018:0135-1, SUSE-SU-2018:0123-1, SUSE-SU-2018:0122-1, SUSE-SU-2018:0120-1, SUSE-SU-2018:0073-1, SUSE-SU-2017:3441-1, SUSE-SU-2017:3214-1, SUSE-SU-2017:3092-1, SUSE-SU-2017:3048-1, SUSE-SU-2017:2947-1, SUSE-SU-2017:2871-2, SUSE-SU-2017:2854-1, SUSE-SU-2017:2831-1, SUSE-SU-2017:2569-1, SUSE-SU-2017:2381-1, SUSE-SU-2017:2344-1, SUSE-SU-2017:2318-1, SUSE-SU-2017:2299-1, SUSE-SU-2017:2264-1, SUSE-SU-2017:2174-1, SUSE-SU-2017:2129-1, SUSE-SU-2017:2117-1, SUSE-SU-2017:2075-1, SUSE-SU-2017:2031-1 |
Oracle | CVE-2021-22959, CVE-2022-21349, CVE-2022-21291, CVE-2022-21305, CVE-2022-21277, CVE-2022-21360, CVE-2022-21365, CVE-2022-21366, CVE-2022-21282, CVE-2022-21296, CVE-2022-21299, CVE-2022-21271, CVE-2022-21283, CVE-2022-21293, CVE-2022-21294, CVE-2022-21340, CVE-2022-21341, CVE-2022-21248 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Windows 10 | CVE-2021-22947, CVE-2021-36957, CVE-2021-36976, CVE-2021-38631, CVE-2021-38665, CVE-2021-38666, CVE-2021-41333, CVE-2021-41356, CVE-2021-41366, CVE-2021-41367, CVE-2021-41370, CVE-2021-41371, CVE-2021-41377, CVE-2021-41378, CVE-2021-41379, CVE-2021-42275, CVE-2021-42276, CVE-2021-42277, CVE-2021-42279, CVE-2021-42280, CVE-2021-42283, CVE-2021-42285, CVE-2021-42288, CVE-2021-43207, CVE-2021-43215, CVE-2021-43216, CVE-2021-43217, CVE-2021-43219, CVE-2021-43222, CVE-2021-43223, CVE-2021-43224, CVE-2021-43226, CVE-2021-43227, CVE-2021-43228, CVE-2021-43229, CVE-2021-43230, CVE-2021-43231, CVE-2021-43232, CVE-2021-43233, CVE-2021-43234, CVE-2021-43235, CVE-2021-43236, CVE-2021-43238, CVE-2021-43244, CVE-2021-43247, CVE-2021-43248, CVE-2021-43883, CVE-2021-43893, CVE-2022-21833, CVE-2022-21834, CVE-2022-21835, CVE-2022-21836, CVE-2022-21838, CVE-2022-21839, CVE-2022-21843, CVE-2022-21848, CVE-2022-21849, CVE-2022-21850, CVE-2022-21851, CVE-2022-21852, CVE-2022-21857, CVE-2022-21858, CVE-2022-21859, CVE-2022-21860, CVE-2022-21861, CVE-2022-21862, CVE-2022-21863, CVE-2022-21864, CVE-2022-21865, CVE-2022-21866, CVE-2022-21867, CVE-2022-21868, CVE-2022-21869, CVE-2022-21870, CVE-2022-21871, CVE-2022-21872, CVE-2022-21873, CVE-2022-21874, CVE-2022-21875, CVE-2022-21876, CVE-2022-21877, CVE-2022-21878, CVE-2022-21879, CVE-2022-21880, CVE-2022-21881, CVE-2022-21882, CVE-2022-21883, CVE-2022-21885, CVE-2022-21888, CVE-2022-21889, CVE-2022-21890, CVE-2022-21892, CVE-2022-21893, CVE-2022-21894, CVE-2022-21895, CVE-2022-21896, CVE-2022-21897, CVE-2022-21898, CVE-2022-21902, CVE-2022-21903, CVE-2022-21904, CVE-2022-21906, CVE-2022-21907, CVE-2022-21908, CVE-2022-21912, CVE-2022-21913, CVE-2022-21914, CVE-2022-21915, CVE-2022-21916, CVE-2022-21918, CVE-2022-21919, CVE-2022-21920, CVE-2022-21922, CVE-2022-21924, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2021-36339 | The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts. A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance. Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226. Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity. |
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Third-party Component | CVEs | More information |
SUSE Linux Enterprise Server 12 SP5 | See SUSE Security Advisories. | See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories. SUSE-SU-2022:0030-1, SUSE-SU-2022:0189-1: CVE-2021-4034 polkit fixes, SUSE-SU-2021:4060-1, SUSE-SU-2021:4004-1, SUSE-SU-2021:3951-1, SUSE-SU-2021:3935-1, SUSE-SU-2021:3878-1, SUSE-SU-2021:3877-1, SUSE-SU-2021:3875-1, SUSE-SU-2021:3859-1, SUSE-SU-2021:3853-1, SUSE-SU-2021:3837-1, SUSE-SU-2021:3748-1, SUSE-SU-2021:3657-1, SUSE-SU-2021:3652-1, SUSE-SU-2021:3611-1, SUSE-SU-2021:3524-1, SUSE-SU-2021:3502-1, SUSE-SU-2021:3491-1, SUSE-SU-2021:3486-1, SUSE-SU-2021:3477-1, SUSE-SU-2021:3475-1, SUSE-SU-2021:3463-1, SUSE-SU-2021:3452-1, SUSE-SU-2021:3237-1, SUSE-SU-2021:3144-1, SUSE-SU-2021:2930-1, SUSE-SU-2021:2876-1, SUSE-SU-2021:2825-1, SUSE-SU-2021:2423-1, SUSE-SU-2021:1621-1, SUSE-SU-2021:0886-1, SUSE-SU-2021:0794-1, SUSE-SU-2021:0432-1, SUSE-SU-2021:0344-1, SUSE-SU-2020:3765-1, SUSE-SU-2020:3596-1, SUSE-SU-2020:3262-1, SUSE-SU-2020:3121-1, SUSE-SU-2020:2699-1, SUSE-SU-2020:2275-1, SUSE-SU-2020:1839-1, SUSE-SU-2020:1732-1, SUSE-SU-2020:1662-1, SUSE-SU-2020:1612-1, SUSE-SU-2020:1570-1, SUSE-SU-2020:1550-1, SUSE-SU-2020:1534-1, SUSE-SU-2020:1524-1, SUSE-SU-2020:1180-1, SUSE-SU-2020:0854-1, SUSE-SU-2020:0630-1, SUSE-SU-2020:0545-1, SUSE-SU-2020:0497-1, SUSE-SU-2020:0457-1, SUSE-SU-2020:0410-1, SUSE-SU-2020:0331-1, SUSE-SU-2020:0088-1, SUSE-SU-2019:3180-1, SUSE-SU-2019:3060-2, SUSE-SU-2019:2972-1, SUSE-SU-2019:2941-1, SUSE-SU-2019:2936-1, SUSE-SU-2019:2798-1, SUSE-SU-2019:2781-1, SUSE-SU-2019:2669-1, SUSE-SU-2019:2339-2, SUSE-SU-2019:2265-1, SUSE-SU-2019:2264-1, SUSE-SU-2019:2013-1, SUSE-SU-2019:1972-1, SUSE-SU-2019:1955-1, SUSE-SU-2019:1733-1, SUSE-SU-2019:1645-1, SUSE-SU-2019:1606-2, SUSE-SU-2019:1606-1, SUSE-SU-2019:1468-1, SUSE-SU-2019:1456-1, SUSE-SU-2019:1379-1, SUSE-SU-2019:1363-1, SUSE-SU-2019:1265-1, SUSE-SU-2019:1166-1, SUSE-SU-2019:1111-1, SUSE-SU-2019:1091-1, SUSE-SU-2019:1060-1, SUSE-SU-2019:0996-1, SUSE-SU-2019:0956-1, SUSE-SU-2019:0839-1, SUSE-SU-2019:0838-1, SUSE-SU-2019:0776-1, SUSE-SU-2019:0747-1, SUSE-SU-2019:0655-1, SUSE-SU-2019:0450-1, SUSE-SU-2019:0428-1, SUSE-SU-2019:0249-1, SUSE-SU-2019:0209-1, SUSE-SU-2019:0135-1, SUSE-SU-2018:4191-1, SUSE-SU-2018:4149-1, SUSE-SU-2018:3967-1, SUSE-SU-2018:3926-1, SUSE-SU-2018:3911-1, SUSE-SU-2018:3884-1, SUSE-SU-2018:3767-1, SUSE-SU-2018:3640-1, SUSE-SU-2018:3608-1, SUSE-SU-2018:3545-1, SUSE-SU-2018:3447-1, SUSE-SU-2018:3289-1, SUSE-SU-2018:3286-1, SUSE-SU-2018:3219-1, SUSE-SU-2018:3066-1, SUSE-SU-2018:2991-1, SUSE-SU-2018:2978-1, SUSE-SU-2018:2842-1, SUSE-SU-2018:2841-1, SUSE-SU-2018:2837-1, SUSE-SU-2018:2836-1, SUSE-SU-2018:2835-1, SUSE-SU-2018:2814-1, SUSE-SU-2018:2779-1, SUSE-SU-2018:2715-1, SUSE-SU-2018:2451-2, SUSE-SU-2018:2204-1, SUSE-SU-2018:2171-1, SUSE-SU-2018:2145-1, SUSE-SU-2018:2071-1, SUSE-SU-2018:2038-1, SUSE-SU-2018:1997-1, SUSE-SU-2018:1972-1, SUSE-SU-2018:1950-1, SUSE-SU-2018:1836-1, SUSE-SU-2018:1826-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:1401-1, SUSE-SU-2018:1398-1, SUSE-SU-2018:1373-1, SUSE-SU-2018:1327-1, SUSE-SU-2018:1288-1, SUSE-SU-2018:1195-1, SUSE-SU-2018:1180-1, SUSE-SU-2018:1074-1, SUSE-SU-2018:0926-1, SUSE-SU-2018:0878-1, SUSE-SU-2018:0858-1, SUSE-SU-2018:0769-1, SUSE-SU-2018:0673-1, SUSE-SU-2018:0662-1, SUSE-SU-2018:0650-1, SUSE-SU-2018:0546-1, SUSE-SU-2018:0510-1, SUSE-SU-2018:0373-1, SUSE-SU-2018:0337-1, SUSE-SU-2018:0299-1, SUSE-SU-2018:0295-1, SUSE-SU-2018:0284-1, SUSE-SU-2018:0260-1, SUSE-SU-2018:0217-1, SUSE-SU-2018:0200-1, SUSE-SU-2018:0193-1, SUSE-SU-2018:0181-1, SUSE-SU-2018:0173-1, SUSE-SU-2018:0135-1, SUSE-SU-2018:0123-1, SUSE-SU-2018:0122-1, SUSE-SU-2018:0120-1, SUSE-SU-2018:0073-1, SUSE-SU-2017:3441-1, SUSE-SU-2017:3214-1, SUSE-SU-2017:3092-1, SUSE-SU-2017:3048-1, SUSE-SU-2017:2947-1, SUSE-SU-2017:2871-2, SUSE-SU-2017:2854-1, SUSE-SU-2017:2831-1, SUSE-SU-2017:2569-1, SUSE-SU-2017:2381-1, SUSE-SU-2017:2344-1, SUSE-SU-2017:2318-1, SUSE-SU-2017:2299-1, SUSE-SU-2017:2264-1, SUSE-SU-2017:2174-1, SUSE-SU-2017:2129-1, SUSE-SU-2017:2117-1, SUSE-SU-2017:2075-1, SUSE-SU-2017:2031-1 |
Oracle | CVE-2021-22959, CVE-2022-21349, CVE-2022-21291, CVE-2022-21305, CVE-2022-21277, CVE-2022-21360, CVE-2022-21365, CVE-2022-21366, CVE-2022-21282, CVE-2022-21296, CVE-2022-21299, CVE-2022-21271, CVE-2022-21283, CVE-2022-21293, CVE-2022-21294, CVE-2022-21340, CVE-2022-21341, CVE-2022-21248 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Windows 10 | CVE-2021-22947, CVE-2021-36957, CVE-2021-36976, CVE-2021-38631, CVE-2021-38665, CVE-2021-38666, CVE-2021-41333, CVE-2021-41356, CVE-2021-41366, CVE-2021-41367, CVE-2021-41370, CVE-2021-41371, CVE-2021-41377, CVE-2021-41378, CVE-2021-41379, CVE-2021-42275, CVE-2021-42276, CVE-2021-42277, CVE-2021-42279, CVE-2021-42280, CVE-2021-42283, CVE-2021-42285, CVE-2021-42288, CVE-2021-43207, CVE-2021-43215, CVE-2021-43216, CVE-2021-43217, CVE-2021-43219, CVE-2021-43222, CVE-2021-43223, CVE-2021-43224, CVE-2021-43226, CVE-2021-43227, CVE-2021-43228, CVE-2021-43229, CVE-2021-43230, CVE-2021-43231, CVE-2021-43232, CVE-2021-43233, CVE-2021-43234, CVE-2021-43235, CVE-2021-43236, CVE-2021-43238, CVE-2021-43244, CVE-2021-43247, CVE-2021-43248, CVE-2021-43883, CVE-2021-43893, CVE-2022-21833, CVE-2022-21834, CVE-2022-21835, CVE-2022-21836, CVE-2022-21838, CVE-2022-21839, CVE-2022-21843, CVE-2022-21848, CVE-2022-21849, CVE-2022-21850, CVE-2022-21851, CVE-2022-21852, CVE-2022-21857, CVE-2022-21858, CVE-2022-21859, CVE-2022-21860, CVE-2022-21861, CVE-2022-21862, CVE-2022-21863, CVE-2022-21864, CVE-2022-21865, CVE-2022-21866, CVE-2022-21867, CVE-2022-21868, CVE-2022-21869, CVE-2022-21870, CVE-2022-21871, CVE-2022-21872, CVE-2022-21873, CVE-2022-21874, CVE-2022-21875, CVE-2022-21876, CVE-2022-21877, CVE-2022-21878, CVE-2022-21879, CVE-2022-21880, CVE-2022-21881, CVE-2022-21882, CVE-2022-21883, CVE-2022-21885, CVE-2022-21888, CVE-2022-21889, CVE-2022-21890, CVE-2022-21892, CVE-2022-21893, CVE-2022-21894, CVE-2022-21895, CVE-2022-21896, CVE-2022-21897, CVE-2022-21898, CVE-2022-21902, CVE-2022-21903, CVE-2022-21904, CVE-2022-21906, CVE-2022-21907, CVE-2022-21908, CVE-2022-21912, CVE-2022-21913, CVE-2022-21914, CVE-2022-21915, CVE-2022-21916, CVE-2022-21918, CVE-2022-21919, CVE-2022-21920, CVE-2022-21922, CVE-2022-21924, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Product | Affected Versions | Updated Versions | Link to Update |
Unisphere for PowerMax | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere for PowerMax | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere 360 | Versions before 9.1.0.30 | 9.1.0.30 | Unisphere 360 Drivers & Downloads |
Unisphere 360 | Versions before 9.2.3.4 | 9.2.3.4 | Unisphere 360 Drivers & Downloads |
Solutions Enabler | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
Solutions Enabler | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
VASA Provider | Versions before 9.1.0.724 | 9.1.0.724 | VASA Provider Drivers & Downloads |
VASA Provider | Versions before 9.2.3.10 | 9.2.3.10 | VASA Provider Drivers & Downloads |
PowerMax OS | 5978 | 5978 | Request OPT 596274 for Foxtail SR and Hickory SR |
Product | Affected Versions | Updated Versions | Link to Update |
Unisphere for PowerMax | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere for PowerMax | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere 360 | Versions before 9.1.0.30 | 9.1.0.30 | Unisphere 360 Drivers & Downloads |
Unisphere 360 | Versions before 9.2.3.4 | 9.2.3.4 | Unisphere 360 Drivers & Downloads |
Solutions Enabler | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
Solutions Enabler | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
VASA Provider | Versions before 9.1.0.724 | 9.1.0.724 | VASA Provider Drivers & Downloads |
VASA Provider | Versions before 9.2.3.10 | 9.2.3.10 | VASA Provider Drivers & Downloads |
PowerMax OS | 5978 | 5978 | Request OPT 596274 for Foxtail SR and Hickory SR |
CVE-2021-36339: Dell Technologies would like to thank Thorsten Tüllmann for reporting the Virtual Appliance privilege escalation vulnerability.
Revision | Date | Description |
1.0 | 2022-03-23 | PowerMax Q1 2022 Quarterly Security Update |
2.0 | 2022-04-22 | Added note to address CVE-2021-4034 |
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
PowerMax, PowerMax 2000, PowerMax 8000, PowerMaxOS 5978, Product Security Information, Solutions Enabler, Solutions Enabler Series, Unisphere 360, Unisphere for VMAX, Unisphere for PowerMax, VASA Provider, VMAX, VMAX 200K, VMAX 450F
06 Jun 2022
7
Dell Security Advisory