DSA-2023-320: Security Update for Dell VxRail Multiple Vulnerabilities – 7.0.480
Summary: Dell VxRail remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-Party Component | CVEs | More Information |
| Dell PowerEdge BIOS | CVE-2023-32461, CVE-2023-0215, CVE-2023-0286, CVE-2022-4304, CVE-2022-4450, CVE-2023-25537, CVE-2022-33894, CVE-2022-38087, CVE-2022-40982, CVE-2022-38083, CVE-2022-43505, CVE-2023-23908, CVE-2022-41804, CVE-2021-38578, CVE-2024-0172 | DSA-2023-134, DSA-2023-098, DSA-2023-096, DSA-2023-206, DSA-2023-097, DSA-2024-035 |
| Dell PowerEdge Intel E810 Series Firmware | CVE-2023-22276, CVE-2023-25775 | DSA-2023-208 |
| Dell PowerEdge Intel E810 Series Firmware | CVE-2023-28376 | DSA-2023-378 |
| Dell PowerEdge AMD BIOS | CVE-2023-20566, CVE-2023-20533, CVE-2023-20526, CVE-2023-20521, CVE-2023-20519, CVE-2022-23830, CVE-2022-23820, CVE-2021-46774, CVE-2021-46766, CVE-2021-26345 | DSA-2023-355 |
| OpenSSL | CVE-2023-2650 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| OpenSSH | CVE-2023-38408, CVE-2016-20012 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| PostgreSQL | CVE-2023-2454, CVE-2023-2455 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| VMware vCenter | CVE-2023-34048, CVE-2023-34056 | For more information, see VMSA-2023-0023 |
| Python Celery | CVE-2021-23727 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| SUSE | CVE-2023-4156,CVE-2023-4004,CVE-2023-39418,CVE-2023-39417,CVE-2023-38408,CVE-2023-3817,CVE-2023-3812,CVE-2023-3776,CVE-2023-3611,CVE-2023-3609,CVE-2023-36054,CVE-2023-35829,CVE-2023-35828,CVE-2023-35824,CVE-2023-35823,CVE-2023-35788,CVE-2023-3567,CVE-2023-35001,CVE-2023-34969,CVE-2023-3446,CVE-2023-3390,CVE-2023-3389,CVE-2023-3358,CVE-2023-3357,CVE-2023-3338,CVE-2023-33288,CVE-2023-32681,CVE-2023-3268,CVE-2023-32461,CVE-2023-32269,CVE-2023-32233,CVE-2023-3212,CVE-2023-32001,CVE-2023-3161,CVE-2023-3159,CVE-2023-31484,CVE-2023-31436,CVE-2023-3141,CVE-2023-3138,CVE-2023-31248,CVE-2023-3117,CVE-2023-3111,CVE-2023-31084,CVE-2023-31083,CVE-2023-3090,CVE-2023-30772,CVE-2023-30630,CVE-2023-30456,CVE-2023-3006,CVE-2023-2985,CVE-2023-2975,CVE-2023-2953,CVE-2023-29491,CVE-2023-29469,CVE-2023-29383,CVE-2023-2911,CVE-2023-28772,CVE-2023-28709,CVE-2023-28708,CVE-2023-28642,CVE-2023-2860,CVE-2023-28487,CVE-2023-28486,CVE-2023-28484,CVE-2023-28466,CVE-2023-28464,CVE-2023-28410,CVE-2023-28370,CVE-2023-28328,CVE-2023-28327,CVE-2023-28322,CVE-2023-28321,CVE-2023-28320,CVE-2023-28319,CVE-2023-2828,CVE-2023-27561,CVE-2023-27538,CVE-2023-27536,CVE-2023-27535,CVE-2023-27534,CVE-2023-27533,CVE-2023-27320,CVE-2023-26555,CVE-2023-26554,CVE-2023-26553,CVE-2023-26552,CVE-2023-26551,CVE-2023-26545,CVE-2023-2650,CVE-2023-2610,CVE-2023-2609,CVE-2023-2603,CVE-2023-2602,CVE-2023-25809,CVE-2023-25775,CVE-2023-25537,CVE-2023-25193,CVE-2023-25180,CVE-2023-25173,CVE-2023-25153,CVE-2023-2513,CVE-2023-25012,CVE-2023-24998,CVE-2023-2483,CVE-2023-24593,CVE-2023-2455,CVE-2023-2454,CVE-2023-24329,CVE-2023-2426,CVE-2023-23931,CVE-2023-23586,CVE-2023-23559,CVE-2023-23006,CVE-2023-23004,CVE-2023-23001,CVE-2023-23000,CVE-2023-22998,CVE-2023-22995,CVE-2023-2269,CVE-2023-2235,CVE-2023-22276,CVE-2023-22049,CVE-2023-22045,CVE-2023-22044,CVE-2023-22041,CVE-2023-22036,CVE-2023-22006,CVE-2023-21968,CVE-2023-21967,CVE-2023-21954,CVE-2023-2194,CVE-2023-21939,CVE-2023-21938,CVE-2023-21937,CVE-2023-21930,CVE-2023-21843,CVE-2023-21835,CVE-2023-2176,CVE-2023-2166,CVE-2023-2162,CVE-2023-2156,CVE-2023-21400,CVE-2023-2124,CVE-2023-21102,CVE-2023-20867,CVE-2023-20593,CVE-2023-20569,CVE-2023-2019,CVE-2023-2008,CVE-2023-2002,CVE-2023-1998,CVE-2023-1990,CVE-2023-1989,CVE-2023-1981,CVE-2023-1872,CVE-2023-1855,CVE-2023-1838,CVE-2023-1829,CVE-2023-1670,CVE-2023-1652,CVE-2023-1637,CVE-2023-1611,CVE-2023-1582,CVE-2023-1513,CVE-2023-1410,CVE-2023-1390,CVE-2023-1387,CVE-2023-1382,CVE-2023-1380,CVE-2023-1355,CVE-2023-1281,CVE-2023-1264,CVE-2023-1255,CVE-2023-1249,CVE-2023-1195,CVE-2023-1175,CVE-2023-1170,CVE-2023-1127,CVE-2023-1118,CVE-2023-1095,CVE-2023-1079,CVE-2023-1078,CVE-2023-1077,CVE-2023-1076,CVE-2023-1075,CVE-2023-0922,CVE-2023-0687,CVE-2023-0597,CVE-2023-0590,CVE-2023-0512,CVE-2023-0466,CVE-2023-0465,CVE-2023-0464,CVE-2023-0461,CVE-2023-0459,CVE-2023-0394,CVE-2023-0386,CVE-2023-0361,CVE-2023-0286,CVE-2023-0215,CVE-2023-0045,CVE-2022-4904,CVE-2022-4899,CVE-2022-48303,CVE-2022-4744,CVE-2022-46908,CVE-2022-46146,CVE-2022-45919,CVE-2022-45887,CVE-2022-45886,CVE-2022-45885,CVE-2022-45884,CVE-2022-45143,CVE-2022-45061,CVE-2022-4450,CVE-2022-43945,CVE-2022-4304,CVE-2022-4269,CVE-2022-41862,CVE-2022-41715,CVE-2022-40982,CVE-2022-40735,CVE-2022-38096,CVE-2022-38087,CVE-2022-37026,CVE-2022-36280,CVE-2022-36109,CVE-2022-36062,CVE-2022-35957,CVE-2022-3566,CVE-2022-3555,CVE-2022-3523,CVE-2022-33894,CVE-2022-32149,CVE-2022-3171,CVE-2022-31107,CVE-2022-31097,CVE-2022-29824,CVE-2022-28737,CVE-2022-27664,CVE-2022-23471,CVE-2022-2196,CVE-2022-1941,CVE-2022-0185,CVE-2022-0155,CVE-2021-43138,CVE-2021-3923,CVE-2021-3918,CVE-2021-38578,CVE-2021-3807,CVE-2021-3541,CVE-2021-3246,CVE-2021-30560,CVE-2021-30465,CVE-2021-29650,CVE-2021-22570,CVE-2021-22569,CVE-2020-7753,CVE-2020-36694,CVE-2020-36691,CVE-2020-36242,CVE-2020-25659,CVE-2020-23903,CVE-2020-12762,CVE-2019-20916,CVE-2019-19921,CVE-2019-15133,CVE-2018-13139,CVE-2018-11490,CVE-2018-1000518,CVE-2017-5753,CVE-2016-3977,CVE-2016-20012,CVE-2007-4559 | For more information, see the SUSE Website https://www.suse.com/security/cve/ |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2023-32463 | Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction | 3.4 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2023-32463 | Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction | 3.4 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
Affected Products & Remediation
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell EMC VxRail Appliance | Versions prior to 7.0.480 | Version 7.0.480 | VxRail 7.0.480 |
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell EMC VxRail Appliance | Versions prior to 7.0.480 | Version 7.0.480 | VxRail 7.0.480 |
Revision History
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2023-10-12 | Initial Release |
| 2.0 | 2023-10-13 | Updated for enhanced presentation with no changes to content. |
| 3.0 | 2023-10-27 | Amended to add CVE remediated in VMSA-2023-0023 |
| 4.0 | 2023-11-22 | Amended for Intel firmware and PowerEdge BIOS AMD vulnerabilities |
| 5.0 | 2024-04-11 | Added CVE-2024-0172 |
| 6.0 | 2024-04-11 | Updated for enhanced presentation with no change to content. |
Related Information
Legal Disclaimer
Affected Products
VxRail, CloudArray Virtual Edition for VxRail Appliance, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes
, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560, VxRail E560 VCF, VxRail E560F, VxRail E560F VCF, VxRail E560N, VxRail E560N VCF, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560 VCF, VxRail G560F, VxRail G560F VCF, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570 VCF, VxRail P570F, VxRail P570F VCF, VxRail P580N, VxRail P580N VCF, VxRail P670F, VxRail P670N, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S570 VCF, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570 VCF, VxRail V570F, VxRail V570F VCF, VXRAIL V670F, VxRail VD-4000R, VxRail VD-4000W, VxRail VD-4000Z, VxRail VD-4510C, VxRail VD-4520C, VxRail VD Series Nodes, VxRail VE-660, VxRail VP-760
...
Article Properties
Article Number: 000218139
Article Type: Dell Security Advisory
Last Modified: 19 Sep 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.