DSA-2023-305: Security Update for Dell Secure Connect Gateway Multiple Third-Party Component Vulnerabilities
Summary: Dell Secure Connect Gateway remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-Party Component |
CVEs | More information |
|---|---|---|
| Apache Tomcat | CVE-2023-28709 | See NVD link below for individual scores for each CVE https://nvd.nist.gov |
| Docker | CVE-2023-28840, CVE-2023-28842 | See SUSE link below for each CVE https://www.suse.com |
| Guava | CVE-2023-2976 | See SUSE link below for each CVE https://www.suse.com |
| Java | CVE-2023-21930, CVE-2023-21937, CVE-2023-21938, CVE-2023-21939, CVE-2023-21954, CVE-2023-21967, CVE-2023-21968 | See SUSE link below for each CVE https://www.suse.com |
| Kernel | CVE-2022-3566, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2023-0459, CVE-2023-1380, CVE-2023-20569, CVE-2023-2176, CVE-2023-2194, CVE-2023-2269, CVE-2023-2513, CVE-2023-28466, CVE-2023-31084, CVE-2023-31436, CVE-2023-32269, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2022-40982 |
See SUSE link below for each CVE https://www.suse.com |
| Ldap | CVE-2023-2953 | See SUSE link below for each CVE https://www.suse.com |
| Libbind9 | CVE-2023-2828 | See SUSE link below for each CVE https://www.suse.com |
| Libcap | CVE-2023-2603 | See SUSE link below for each CVE https://www.suse.com |
| Libopenssl1 | CVE-2023-2650, CVE-2023-3817 | See SUSE link below for each CVE https://www.suse.com |
| Libpcre2 | CVE-2022-1587 | See SUSE link below for each CVE https://www.suse.com |
| libX11 | CVE-2023-3138 | See SUSE link below for each CVE https://www.suse.com |
| Netty | CVE-2023-34462 | See NVD link below for individual scores for each CVE https://nvd.nist.gov |
| Ntp | CVE-2023-26555 | See SUSE link below for each CVE https://www.suse.com |
| Okio | CVE-2023-3635 | See NVD link below for individual scores for each CVE https://nvd.nist.gov |
| OpenSSH | CVE-2016-20012, CVE-2020-14145, CVE-2020-15778 CVE-2021-36368 , CVE-2023-38408 |
See SUSE link below for each CVE https://www.suse.com |
| OpenSSL | CVE-2022-0778, CVE-2022-1292, CVE-2022-2068, CVE-2022-2097, CVE-2022-4304, CVE-2023-0286, CVE-2023-1255, |
See SUSE link below for each CVE https://www.suse.com |
| Open-vm-tools | CVE-2023-20867 | See SUSE link below for each CVE https://www.suse.com |
| Palo Alto | CVE-2023-0001 | See NVD link below for individual scores for each CVE https://nvd.nist.gov |
| PostgreSQL | CVE-2023-2454, CVE-2023-2455 | See SUSE link below for each CVE https://www.suse.com |
| Python | CVE-2007-4559 | See SUSE link below for each CVE https://www.suse.com |
| Vim | CVE-2023-0049 | See SUSE link below for each CVE https://www.suse.com |
Affected Products & Remediation
| CVEs Addressed |
Product | Affected Versions | Remediated Versions | Link to Update |
|---|---|---|---|---|
| CVE-2007-4559, CVE-2016-20012, CVE-2020-14145, CVE-2020-15778, CVE-2021-36368, CVE-2022-0778, CVE-2022-1292, CVE-2022-1587, CVE-2022-2068, CVE-2022-2097, CVE-2022-3566, CVE-2022-40982, CVE-2022-4304, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2023-0001, CVE-2023-0286, CVE-2023-0459, CVE-2023-1255, CVE-2023-1380, CVE-2023-20569, CVE-2023-20867, CVE-2023-2176, CVE-2023-21930, CVE-2023-21937, CVE-2023-21938, CVE-2023-21939, CVE-2023-2194, CVE-2023-21954, CVE-2023-21967, CVE-2023-21968, CVE-2023-2269, CVE-2023-2454, CVE-2023-2455, CVE-2023-2513, CVE-2023-2603, CVE-2023-2650, CVE-2023-26555, CVE-2023-2828, CVE-2023-28466, CVE-2023-28709, CVE-2023-28840, CVE-2023-28842, CVE-2023-2953, CVE-2023-2976, CVE-2023-31084, CVE-2023-3138, CVE-2023-31436, CVE-2023-32269, CVE-2023-34462, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3635, CVE-2023-3817, CVE-2023-38408, CVE-2023-0049 | Dell Secure Connect Gateway | Versions 5.12.00.10, 5.14.00.16, 5.16.00.14 |
Version 5.18.00.20 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers |
| CVEs Addressed |
Product | Affected Versions | Remediated Versions | Link to Update |
|---|---|---|---|---|
| CVE-2007-4559, CVE-2016-20012, CVE-2020-14145, CVE-2020-15778, CVE-2021-36368, CVE-2022-0778, CVE-2022-1292, CVE-2022-1587, CVE-2022-2068, CVE-2022-2097, CVE-2022-3566, CVE-2022-40982, CVE-2022-4304, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2023-0001, CVE-2023-0286, CVE-2023-0459, CVE-2023-1255, CVE-2023-1380, CVE-2023-20569, CVE-2023-20867, CVE-2023-2176, CVE-2023-21930, CVE-2023-21937, CVE-2023-21938, CVE-2023-21939, CVE-2023-2194, CVE-2023-21954, CVE-2023-21967, CVE-2023-21968, CVE-2023-2269, CVE-2023-2454, CVE-2023-2455, CVE-2023-2513, CVE-2023-2603, CVE-2023-2650, CVE-2023-26555, CVE-2023-2828, CVE-2023-28466, CVE-2023-28709, CVE-2023-28840, CVE-2023-28842, CVE-2023-2953, CVE-2023-2976, CVE-2023-31084, CVE-2023-3138, CVE-2023-31436, CVE-2023-32269, CVE-2023-34462, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3635, CVE-2023-3817, CVE-2023-38408, CVE-2023-0049 | Dell Secure Connect Gateway | Versions 5.12.00.10, 5.14.00.16, 5.16.00.14 |
Version 5.18.00.20 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers |
Workarounds & Mitigations
None
Revision History
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2023-09-20 | Initial Release |
| 2.0 | 2023-10-4 | Added CVE-2023-0049 under Affected Products and Remediation Table, Added Vim third-party component related to CVE-2023-0049 in the Third-Party Component Table. |
Related Information
Legal Disclaimer
Affected Products
Secure Connect Gateway, Secure Connect GatewayArticle Properties
Article Number: 000217814
Article Type: Dell Security Advisory
Last Modified: 04 Oct 2023
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.