DSA-2023-443: Dell PowerMaxOS 5978, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM Security Update for Multiple Vulnerabilities
Summary: Dell PowerMaxOS 5978, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system. ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
High
Details
| Third-Party Component | CVEs | More Information |
| SOCKS5 | CVE-2023-38545 | https://nvd.nist.gov/vuln/detail/CVE-2023-38545 |
| SLES 12 SP5 | CVE-2016-3709, CVE-2018-7738, CVE-2018-9234, CVE-2020-22218, CVE-2020-36766, CVE-2022-36402, CVE-2022-40982, CVE-2022-48565, CVE-2022-48566, CVE-2023-0394, CVE-2023-0459, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-1981, CVE-2023-2007, CVE-2023-20197, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-28484, CVE-2023-28736, CVE-2023-28938, CVE-2023-29469, CVE-2023-2985, CVE-2023-32182, CVE-2023-32360, CVE-2023-3341, CVE-2023-34241, CVE-2023-34319, CVE-2023-3446, CVE-2023-34969, CVE-2023-35001, CVE-2023-3567, CVE-2023-35945, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-3812, CVE-2023-3817, CVE-2023-38408, CVE-2023-38559, CVE-2023-3863, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-42754, CVE-2023-43115, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4622, CVE-2023-4623, CVE-2023-4641, CVE-2023-4692, CVE-2023-4693, CVE-2023-4881, CVE-2023-4921 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Oracle | CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Windows 10 | CVE-2023-36724, CVE-2023-36434, CVE-2023-36576, CVE-2023-36598, CVE-2023-36731, CVE-2023-36557, CVE-2023-36563, CVE-2023-36721, CVE-2023-44487, CVE-2023-36602, CVE-2023-36725, CVE-2023-36436, CVE-2023-36438, CVE-2023-36720, CVE-2023-36431, CVE-2023-36570, CVE-2023-36722, CVE-2023-36723, CVE-2023-36726, CVE-2023-36732, CVE-2023-41773, CVE-2023-41772, CVE-2023-41771, CVE-2023-41770, CVE-2023-41768, CVE-2023-41767, CVE-2023-36743, CVE-2023-36776, CVE-2023-38166, CVE-2023-36902, CVE-2023-35349, CVE-2023-36564, CVE-2023-36567, CVE-2023-36571, CVE-2023-36572, CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606, CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702, CVE-2023-36704, CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712, CVE-2023-36713, CVE-2023-36729, CVE-2023-41774, CVE-2023-41769, CVE-2023-41766, CVE-2023-41765, CVE-2023-38159, CVE-2023-36794, CVE-2023-36792, CVE-2023-36796, CVE-2023-36788, CVE-2023-36793, CVE-2023-36803, CVE-2023-38142, CVE-2023-38160, CVE-2023-38161, CVE-2023-36802, CVE-2023-36804, CVE-2023-36805, CVE-2023-38139, CVE-2023-38140, CVE-2023-38141, CVE-2023-38143, CVE-2023-38144, CVE-2023-38147, CVE-2023-38149, CVE-2023-35355, CVE-2023-36899, CVE-2023-36873, CVE-2023-38172, CVE-2023-38184, CVE-2023-35387, CVE-2023-35386, CVE-2023-35385, CVE-2023-35384, CVE-2023-35383, CVE-2023-35380, CVE-2023-35378, CVE-2023-35377, CVE-2023-38254, CVE-2023-36913, CVE-2023-36911, CVE-2023-36907, CVE-2023-36889 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2023-48660 | Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| CVE-2023-48661 | Dell vApp Manager, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability to read arbitrary files from the target system. | 4.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
| CVE-2023-48662 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48663 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48664 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48665 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48671 | Dell vApp Manager, versions prior to 9.2.4.x contain an information disclosure vulnerability. A remote attacker could potentially exploit this vulnerability leading to obtain sensitive information that may aid in further attacks. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2023-48660 | Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| CVE-2023-48661 | Dell vApp Manager, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability to read arbitrary files from the target system. | 4.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
| CVE-2023-48662 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48663 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48664 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48665 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2023-48671 | Dell vApp Manager, versions prior to 9.2.4.x contain an information disclosure vulnerability. A remote attacker could potentially exploit this vulnerability leading to obtain sensitive information that may aid in further attacks. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Affected Products & Remediation
| CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere for PowerMax | Host Installation | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Unisphere for PowerMax Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere 360 | Host Installation | Versions prior to 9.2.4.11 | Version 9.2.4.11 | https://www.dell.com/support/home/product-support/product/unisphere-360/drivers |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Solutions Enabler Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.5 | Version 9.2.4.5 | https://www.dell.com/support/home/product-support/product/solutions-enabler/drivers |
| CVE-2016-3709, CVE-2018-7738, CVE-2018-9234, CVE-2020-22218, CVE-2020-36766, CVE-2022-36402, CVE-2022-40982, CVE-2022-48565, CVE-2022-48566, CVE-2023-0394, CVE-2023-0459, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-1981, CVE-2023-2007, CVE-2023-20197, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-28484, CVE-2023-28736, CVE-2023-28938, CVE-2023-29469, CVE-2023-2985, CVE-2023-32182, CVE-2023-32360, CVE-2023-3341, CVE-2023-34241, CVE-2023-34319, CVE-2023-3446, CVE-2023-34969, CVE-2023-35001, CVE-2023-3567, CVE-2023-35945, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-3812, CVE-2023-3817, CVE-2023-38408, CVE-2023-38559, CVE-2023-3863, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-42754, CVE-2023-43115, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4622, CVE-2023-4623, CVE-2023-4641, CVE-2023-4692, CVE-2023-4693, CVE-2023-4881, CVE-2023-4921, CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Dell PowerMax EEM | Embedded Management | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
| CVE-2023-36724, CVE-2023-36434, CVE-2023-36576, CVE-2023-36598, CVE-2023-36731, CVE-2023-36557, CVE-2023-36563, CVE-2023-36721, CVE-2023-44487, CVE-2023-36602, CVE-2023-36725, CVE-2023-36436, CVE-2023-36438, CVE-2023-36720, CVE-2023-36431, CVE-2023-36570, CVE-2023-36722, CVE-2023-36723, CVE-2023-36726, CVE-2023-36732, CVE-2023-41773, CVE-2023-41772, CVE-2023-41771, CVE-2023-41770, CVE-2023-41768, CVE-2023-41767, CVE-2023-36743, CVE-2023-36776, CVE-2023-38166, CVE-2023-36902, CVE-2023-35349, CVE-2023-36564, CVE-2023-36567, CVE-2023-36571, CVE-2023-36572, CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606, CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702, CVE-2023-36704, CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712, CVE-2023-36713, CVE-2023-36729, CVE-2023-41774, CVE-2023-41769, CVE-2023-41766, CVE-2023-41765, CVE-2023-38159, CVE-2023-36794, CVE-2023-36792, CVE-2023-36796, CVE-2023-36788, CVE-2023-36793, CVE-2023-36803, CVE-2023-38142, CVE-2023-38160, CVE-2023-38161, CVE-2023-36802, CVE-2023-36804, CVE-2023-36805, CVE-2023-38139, CVE-2023-38140, CVE-2023-38141, CVE-2023-38143, CVE-2023-38144, CVE-2023-38147, CVE-2023-38149, CVE-2023-35355, CVE-2023-36899, CVE-2023-36873, CVE-2023-38172, CVE-2023-38184, CVE-2023-35387, CVE-2023-35386, CVE-2023-35385, CVE-2023-35384, CVE-2023-35383, CVE-2023-35380, CVE-2023-35378, CVE-2023-35377, CVE-2023-38254, CVE-2023-36913, CVE-2023-36911, CVE-2023-36907, CVE-2023-36889 | PowerMaxOS 5978 | PowerMax OS | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
| CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere for PowerMax | Host Installation | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Unisphere for PowerMax Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere 360 | Host Installation | Versions prior to 9.2.4.11 | Version 9.2.4.11 | https://www.dell.com/support/home/product-support/product/unisphere-360/drivers |
| CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Solutions Enabler Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.5 | Version 9.2.4.5 | https://www.dell.com/support/home/product-support/product/solutions-enabler/drivers |
| CVE-2016-3709, CVE-2018-7738, CVE-2018-9234, CVE-2020-22218, CVE-2020-36766, CVE-2022-36402, CVE-2022-40982, CVE-2022-48565, CVE-2022-48566, CVE-2023-0394, CVE-2023-0459, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-1981, CVE-2023-2007, CVE-2023-20197, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-28484, CVE-2023-28736, CVE-2023-28938, CVE-2023-29469, CVE-2023-2985, CVE-2023-32182, CVE-2023-32360, CVE-2023-3341, CVE-2023-34241, CVE-2023-34319, CVE-2023-3446, CVE-2023-34969, CVE-2023-35001, CVE-2023-3567, CVE-2023-35945, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-3812, CVE-2023-3817, CVE-2023-38408, CVE-2023-38559, CVE-2023-3863, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-42754, CVE-2023-43115, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4622, CVE-2023-4623, CVE-2023-4641, CVE-2023-4692, CVE-2023-4693, CVE-2023-4881, CVE-2023-4921, CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Dell PowerMax EEM | Embedded Management | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
| CVE-2023-36724, CVE-2023-36434, CVE-2023-36576, CVE-2023-36598, CVE-2023-36731, CVE-2023-36557, CVE-2023-36563, CVE-2023-36721, CVE-2023-44487, CVE-2023-36602, CVE-2023-36725, CVE-2023-36436, CVE-2023-36438, CVE-2023-36720, CVE-2023-36431, CVE-2023-36570, CVE-2023-36722, CVE-2023-36723, CVE-2023-36726, CVE-2023-36732, CVE-2023-41773, CVE-2023-41772, CVE-2023-41771, CVE-2023-41770, CVE-2023-41768, CVE-2023-41767, CVE-2023-36743, CVE-2023-36776, CVE-2023-38166, CVE-2023-36902, CVE-2023-35349, CVE-2023-36564, CVE-2023-36567, CVE-2023-36571, CVE-2023-36572, CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606, CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702, CVE-2023-36704, CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712, CVE-2023-36713, CVE-2023-36729, CVE-2023-41774, CVE-2023-41769, CVE-2023-41766, CVE-2023-41765, CVE-2023-38159, CVE-2023-36794, CVE-2023-36792, CVE-2023-36796, CVE-2023-36788, CVE-2023-36793, CVE-2023-36803, CVE-2023-38142, CVE-2023-38160, CVE-2023-38161, CVE-2023-36802, CVE-2023-36804, CVE-2023-36805, CVE-2023-38139, CVE-2023-38140, CVE-2023-38141, CVE-2023-38143, CVE-2023-38144, CVE-2023-38147, CVE-2023-38149, CVE-2023-35355, CVE-2023-36899, CVE-2023-36873, CVE-2023-38172, CVE-2023-38184, CVE-2023-35387, CVE-2023-35386, CVE-2023-35385, CVE-2023-35384, CVE-2023-35383, CVE-2023-35380, CVE-2023-35378, CVE-2023-35377, CVE-2023-38254, CVE-2023-36913, CVE-2023-36911, CVE-2023-36907, CVE-2023-36889 | PowerMaxOS 5978 | PowerMax OS | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
Revision History
| Revision | Date | Description |
| 1.0 | 2023-12-13 | Initial Version |
| 2.0 | 2024-06-13 | Updated for enhanced presentation with no changes to content |
Acknowledgements
CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671: Dell Technologies would like to thank 33a6099 for reporting these issues.
Related Information
Legal Disclaimer
Affected Products
PowerMax 2000, PowerMax 2500, PowerMax 8000, PowerMax 8500, PowerMaxOS 5978, Solutions Enabler, Unisphere 360, Unisphere for PowerMaxArticle Properties
Article Number: 000220427
Article Type: Dell Security Advisory
Last Modified: 13 Jun 2024
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.