Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Article Number: 000216530


DSA-2023-293: Security Update for Dell Networking MX Series Switches Vulnerabilities

Summary: Dell Networking MX Series Switches remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Article Content


Impact

Critical

Details

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-28078 Dell OS10 Networking Switches, versions 10.5.2.x and above, when configured with VLT or Smart Fabric mode contains an improper restriction of communication channel to intended endpoints vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible denial of service. This is a critical severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity. 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2023-32462 Dell OS10 Networking Switches, versions 10.5.2.x and above, contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system take over. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-28078 Dell OS10 Networking Switches, versions 10.5.2.x and above, when configured with VLT or Smart Fabric mode contains an improper restriction of communication channel to intended endpoints vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible denial of service. This is a critical severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity. 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2023-32462 Dell OS10 Networking Switches, versions 10.5.2.x and above, contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system take over. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

Product Software/Firmware Affected Versions Remediated Versions Link
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 Version 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Product Software/Firmware Affected Versions Remediated Versions Link
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 Version 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers

Acknowledgements

CVE-2023-28078: Dell Technologies would like to thank Rafael Schaefer, ERNW Enno Rey Netzwerke GmbH for reporting this issue.
 

Revision History

RevisionDateDescription
1.02023-08-07Initial release

 

Related Information


Article Properties


Affected Product

Dell EMC Networking MX5108n, Dell EMC Networking MX9116n

Last Published Date

08 Aug 2023

Version

1

Article Type

Dell Security Advisory