DSA-2022-087: Dell EMC PowerFlex Custom Node 15G, VxFlex Ready Node 14G, and ScaleIO Ready Node 13G Security Update for Multiple Vulnerabilities

Resumen: Remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Este artículo se aplica a Este artículo no se aplica a Este artículo no está vinculado a ningún producto específico. No se identifican todas las versiones del producto en este artículo.

Impacto

High

Detalles

Component CVEs More Information
Intel CVE-2021-0060, CVE-2021-0147 Intel article: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html
CVE-2021-0103, CVE-2021-0114,
CVE-2021-0115, CVE-2021-0116,
CVE-2021-0117, CVE-2021-0118,
CVE-2021-0111, CVE-2021-0107, CVE-2021-0125, CVE-2021-0124, CVE-2021-0119, CVE-2021-0091, CVE-2021-0092, CVE-2021-0093
Intel article: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html
CVE-2021-0127 Intel article: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
VMware ESXi CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043, CVE-2021-22050 VMware article:
https://www.vmware.com/security/advisories/VMSA-2022-0004.html
Dell PowerEdge Server BIOS CVE-2019-14584, CVE-2021-28210, CVE-2021-28211 Dell article: https://www.dell.com/support/kbdoc/en-ie/000198065/dsa-2022-088
DELL iDRAC CVE-2022-24442 https://blog.jetbrains.com/
Component CVEs More Information
Intel CVE-2021-0060, CVE-2021-0147 Intel article: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html
CVE-2021-0103, CVE-2021-0114,
CVE-2021-0115, CVE-2021-0116,
CVE-2021-0117, CVE-2021-0118,
CVE-2021-0111, CVE-2021-0107, CVE-2021-0125, CVE-2021-0124, CVE-2021-0119, CVE-2021-0091, CVE-2021-0092, CVE-2021-0093
Intel article: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html
CVE-2021-0127 Intel article: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
VMware ESXi CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043, CVE-2021-22050 VMware article:
https://www.vmware.com/security/advisories/VMSA-2022-0004.html
Dell PowerEdge Server BIOS CVE-2019-14584, CVE-2021-28210, CVE-2021-28211 Dell article: https://www.dell.com/support/kbdoc/en-ie/000198065/dsa-2022-088
DELL iDRAC CVE-2022-24442 https://blog.jetbrains.com/
Dell Technologies recomienda que todos los clientes tengan en cuenta tanto la puntuación base como cualquier otra puntuación ambiental y temporal relevante que pueda afectar la posible gravedad asociada con la vulnerabilidad de seguridad en particular.

Corrección y productos afectados

CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2019-14584 CVE-2021-28210 CVE-2021-28211 R650, R750, R6525 custom node
 
BIOS Versions before 1.5.4 for Intel and 2.6.6 for AMD
 
Intel BIOS: 1.5.4
AMD BIOS: 2.6.6
Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
 
CVE-2021-0060, CVE-2021-0147, CVE-2021-0103, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0099, CVE-2021-0111, CVE-2021-0107, CVE-2021-0125, CVE-2021-0124, CVE-2021-0119, CVE-2021-0092, CVE-2021-0091, CVE-2021-0093, CVE-2021-0127, CVE-2019-14584, CVE-2021-28210 CVE-2021-28211 R640, R740, and R840 custom node BIOS versions before 2.13.3 2.13.3 Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
CVE-2022-24442 R650, R750 custom node
 
iDRAC versions prior to 5.10.10.00 5.10.10.00 Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
CVE-2022-24442 R640, R740, R840 custom node iDRAC versions prior to 5.10.10.00 5.10.10.00 Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043, CVE-2021-22050 ESXi 7.0 patches Versions before 7.0U3c 7.0U3c Refer to Updated Firmware and Driver Support Matrix listing supported ESXi versions per Product offering and link guidance.
CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2019-14584 CVE-2021-28210 CVE-2021-28211 R650, R750, R6525 custom node
 
BIOS Versions before 1.5.4 for Intel and 2.6.6 for AMD
 
Intel BIOS: 1.5.4
AMD BIOS: 2.6.6
Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
 
CVE-2021-0060, CVE-2021-0147, CVE-2021-0103, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0099, CVE-2021-0111, CVE-2021-0107, CVE-2021-0125, CVE-2021-0124, CVE-2021-0119, CVE-2021-0092, CVE-2021-0091, CVE-2021-0093, CVE-2021-0127, CVE-2019-14584, CVE-2021-28210 CVE-2021-28211 R640, R740, and R840 custom node BIOS versions before 2.13.3 2.13.3 Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
CVE-2022-24442 R650, R750 custom node
 
iDRAC versions prior to 5.10.10.00 5.10.10.00 Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
CVE-2022-24442 R640, R740, R840 custom node iDRAC versions prior to 5.10.10.00 5.10.10.00 Downloads (in case of upgrade using OME)
Documents (in case of manual upgrade)
CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043, CVE-2021-22050 ESXi 7.0 patches Versions before 7.0U3c 7.0U3c Refer to Updated Firmware and Driver Support Matrix listing supported ESXi versions per Product offering and link guidance.

Historial de revisiones

RevisionDateDescription
1.02022-03-29Initial release
2.02022-04-22Updated Details Section
3.02022-05-11Updated section with CVE changes

Información relacionada

Productos afectados

VxFlex Ready Nodes, PowerFlex custom node, PowerFlex custom node, PowerFlex custom node R650, PowerFlex custom node R750, Product Security Information, VxFlex Ready Node, ScaleIO Ready Node-PowerEdge 13G, VxFlex Ready Node R640
Propiedades del artículo
Número del artículo: 000198136
Tipo de artículo: Dell Security Advisory
Última modificación: 18 sept 2025
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.