DSA-2022-156: Dell SmartFabric Storage Software Security Update for Multiple Component Vulnerabilities

Summary: Dell SmartFabric Storage Software remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

High

Details

Proprietary Code CVE Description CVSS Base Score CVSS Vector String
CVE-2022-31232 SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVE Description CVSS Base Score CVSS Vector String
CVE-2022-31232 SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

CVEs Addressed Product Affected Version Updated Version Link to Update
CVE-2022-31232 SmartFabric Storage Software 1.0.0 1.1.0 https://www.dell.com/support/home/product-support/product/dell-emc-smartfabric-storage-software-trial/drivers
CVEs Addressed Product Affected Version Updated Version Link to Update
CVE-2022-31232 SmartFabric Storage Software 1.0.0 1.1.0 https://www.dell.com/support/home/product-support/product/dell-emc-smartfabric-storage-software-trial/drivers

Workarounds & Mitigations

If RADIUS and TACACS authentication is not a requirement, then customers can run the "rm /etc/ham/libnss_sac.enable" command to mitigate the vulnerability. If RADIUS and TACACS are a requirement, then customers must update.

Revision History

RevisionDateDescription
1.02022-07-19Initial Release

Related Information

Affected Products

SmartFabric OS10 Software

Products

Product Security Information
Article Properties
Article Number: 000201667
Article Type: Dell Security Advisory
Last Modified: 18 Sep 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.