Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

Article Number: 000201383


DSA-2022-134: Dell Wyse Management Suite Security Update for Multiple Vulnerabilities.

Summary: Dell Wyse Management Suite (WMS) remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Article Content


Impact

High

Details

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2022-33924

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability with which an attacker with no access to create rules may potentially exploit this vulnerability and create rules. The attacker may create a schedule to run the rule.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVE-2022-33925

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. A remote authenticated attacker may potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitive information.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2022-33926

Wyse Management Suite 3.7 and earlier contains an improper access control vulnerability. A remote malicious user may exploit this vulnerability in order to retain access to a file repository after it has been revoked.

7.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

CVE-2022-33927

Wyse Management Suite 3.7 and earlier contains a Session Fixation vulnerability. An unauthenticated attacker may exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2022-33928

Wyse Management Suite 3.7 and earlier contains a Plain-text Password Storage Vulnerability in UI. An attacker with low privileges may potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

6.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

CVE-2022-29090

Wyse Management Suite 3.7 and earlier contains a Sensitive Data Exposure vulnerability. A low privileged malicious user may potentially exploit this vulnerability in order to obtain credentials. The attacker may be able to use the exposed credentials to access the target device and perform unauthorized actions.

8.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

CVE-2022-33929

Wyse Management Suite 3.7 and earlier contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker may potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2022-33930

Wyse Management Suite 3.7 and earlier contains Information Disclosure in Devices error pages. An attacker may potentially exploit this vulnerability, leading to the disclosure of certain sensitive information. The attacker may be able to use the exposed information for access and further vulnerability research.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2022-33931

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. An attacker with no access to Alert Classification page may potentially exploit this vulnerability, leading to changing the alert categories.

6.3

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

CVE-2022-34365

Wyse Management Suite 3.7 contains a Path Traversal Vulnerability in Device API. An attacker may potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server file system, with the privileges of the running web application.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

 
Third-party Component CVEs More information
OpenJDK CVE-2022-21476 CVE-2022-21449 CVE-2022-21496 CVE-2022-21434 CVE-2022-21426 CVE-2022-21443 See NVD (http://nvd.nist.gov/ This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
Zlib CVE-2018-25032
Dapper CVE-2017-15945
Spring Framework CVE-2022-22971 CVE-2022-22970 CVE-2022-22968
Spring Security CVE-2022-22978 CVE-2022-22976
Netty CVE-2022-24823 CVE-2022-25647
Apache tika CVE-2022-30126 CVE-2022-25169
Tomcat CVE-2022-29885

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2022-33924

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability with which an attacker with no access to create rules may potentially exploit this vulnerability and create rules. The attacker may create a schedule to run the rule.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVE-2022-33925

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. A remote authenticated attacker may potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitive information.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2022-33926

Wyse Management Suite 3.7 and earlier contains an improper access control vulnerability. A remote malicious user may exploit this vulnerability in order to retain access to a file repository after it has been revoked.

7.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

CVE-2022-33927

Wyse Management Suite 3.7 and earlier contains a Session Fixation vulnerability. An unauthenticated attacker may exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2022-33928

Wyse Management Suite 3.7 and earlier contains a Plain-text Password Storage Vulnerability in UI. An attacker with low privileges may potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

6.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

CVE-2022-29090

Wyse Management Suite 3.7 and earlier contains a Sensitive Data Exposure vulnerability. A low privileged malicious user may potentially exploit this vulnerability in order to obtain credentials. The attacker may be able to use the exposed credentials to access the target device and perform unauthorized actions.

8.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

CVE-2022-33929

Wyse Management Suite 3.7 and earlier contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker may potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2022-33930

Wyse Management Suite 3.7 and earlier contains Information Disclosure in Devices error pages. An attacker may potentially exploit this vulnerability, leading to the disclosure of certain sensitive information. The attacker may be able to use the exposed information for access and further vulnerability research.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2022-33931

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. An attacker with no access to Alert Classification page may potentially exploit this vulnerability, leading to changing the alert categories.

6.3

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

CVE-2022-34365

Wyse Management Suite 3.7 contains a Path Traversal Vulnerability in Device API. An attacker may potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server file system, with the privileges of the running web application.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

 
Third-party Component CVEs More information
OpenJDK CVE-2022-21476 CVE-2022-21449 CVE-2022-21496 CVE-2022-21434 CVE-2022-21426 CVE-2022-21443 See NVD (http://nvd.nist.gov/ This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
Zlib CVE-2018-25032
Dapper CVE-2017-15945
Spring Framework CVE-2022-22971 CVE-2022-22970 CVE-2022-22968
Spring Security CVE-2022-22978 CVE-2022-22976
Netty CVE-2022-24823 CVE-2022-25647
Apache tika CVE-2022-30126 CVE-2022-25169
Tomcat CVE-2022-29885
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

Product Affected Versions Updated Versions Link to Update  
Dell Wyse Management Suite 3.7 and earlier 3.8 Dell Wyse Management Suite  
 
Product Affected Versions Updated Versions Link to Update  
Dell Wyse Management Suite 3.7 and earlier 3.8 Dell Wyse Management Suite  
 

Acknowledgements

Dell Technologies would like to thank CMSecurity for reporting CVE-2022-33927.
Dell Technologies would like to thank whitehattushu for reporting CVE-2022-33924, CVE-2022-33925, and CVE-2022-33926.

Revision History

RevisionDateDescription
1.02022-07-18Initial Release

Related Information


Article Properties


Affected Product

Wyse Management Suite

Last Published Date

06 Dec 2023

Version

2

Article Type

Dell Security Advisory