DSA-2021-194: Dell EMC CloudLink Security Update for Multiple Security Vulnerabilities

Sommaire: Dell EMC CloudLink Security Update for multiple security vulnerabilities.

Cet article s’applique à Cet article ne s’applique pas à Cet article n’est lié à aucun produit spécifique. Toutes les versions de produits ne sont pas identifiées dans cet article.

Impact

Critical

Détails

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-36312 Dell EMC CloudLink 7.1 and all prior versions contain a Hard-coded Password Vulnerability. A remote high privileged attacker, with the knowledge of the hard-coded credentials, may potentially exploit this vulnerability to gain unauthorized access to the system.  9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-36313 Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. 
This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity.
9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-36314 Dell EMC CloudLink 7.1 and all prior versions contain an Arbitrary File Creation Vulnerability. A remote unauthenticated attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary files on the end user system.  7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
CVE-2021-36332 Dell EMC CloudLink 7.1 and all prior versions contain a HTML and Javascript Injection Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, directing end user to arbitrary and potentially malicious websites.  5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVE-2021-36333 Dell EMC CloudLink 7.1 and all prior versions contain a Buffer Overflow Vulnerability. A local low privileged attacker, may potentially exploit this vulnerability, leading to an application crash.  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-36334 Dell EMC CloudLink 7.1 and all prior versions contain a CSV formula Injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to arbitrary code execution on end user machine 5.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
CVE-2021-36335 Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, leading to execution of arbitrary files on the server 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
 
Third-party Component
 
CVEs More information
Ubuntu 16.04 LTS: libxml2 vulnerabilities  (USN-4991-1) CVE-2021-3516 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2017-8872
CVE-2020-24977
CVE-2021-3541
CVE-2021-3537
CVE-2021-3517
CVE-2021-3518
CVE-2019-20388
Ubuntu 16.04 LTS: LZ4 vulnerability (USN-4968-2) CVE-2021-3520 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS: Intel Microcode vulnerabilities (USN-4985-1) CVE-2020-24512 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2020-24513
CVE-2020-24511
CVE-2020-24489
Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) CVE-2021-31535 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) CVE-2021-31535 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS: GNU C Library vulnerabilities (USN-4954-1) CVE-2009-5155 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2020-6096
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04: Bind vulnerabilities (USN-4929-1) CVE-2021-25215 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2021-25214
CVE-2021-25216
Ubuntu 16.04 LTS / 18.04 LTS: Linux kernel vulnerabilities (USN-4916-1) CVE-2021-3493 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2021-29154
Ubuntu 16.04 LTS: Linux kernel vulnerabilities (USN-4904-1) CVE-2017-16644 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2019-16231
CVE-2021-26930
CVE-2021-28038
CVE-2019-19061
CVE-2021-26931
CVE-2017-5967
CVE-2015-1350
CVE-2019-16232
CVE-2021-20261
CVE-2018-13095
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Nettle vulnerability (USN-4906-1) CVE-2021-20305 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: curl vulnerabilities (USN-4898-1) CVE-2021-22890 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2021-22876
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Bind vulnerability (USN-4737-1) CVE-2020-8625 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
mbedtls CVE-2018-0497 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-36312 Dell EMC CloudLink 7.1 and all prior versions contain a Hard-coded Password Vulnerability. A remote high privileged attacker, with the knowledge of the hard-coded credentials, may potentially exploit this vulnerability to gain unauthorized access to the system.  9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-36313 Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. 
This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity.
9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-36314 Dell EMC CloudLink 7.1 and all prior versions contain an Arbitrary File Creation Vulnerability. A remote unauthenticated attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary files on the end user system.  7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
CVE-2021-36332 Dell EMC CloudLink 7.1 and all prior versions contain a HTML and Javascript Injection Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, directing end user to arbitrary and potentially malicious websites.  5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVE-2021-36333 Dell EMC CloudLink 7.1 and all prior versions contain a Buffer Overflow Vulnerability. A local low privileged attacker, may potentially exploit this vulnerability, leading to an application crash.  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-36334 Dell EMC CloudLink 7.1 and all prior versions contain a CSV formula Injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to arbitrary code execution on end user machine 5.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
CVE-2021-36335 Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, leading to execution of arbitrary files on the server 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
 
Third-party Component
 
CVEs More information
Ubuntu 16.04 LTS: libxml2 vulnerabilities  (USN-4991-1) CVE-2021-3516 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2017-8872
CVE-2020-24977
CVE-2021-3541
CVE-2021-3537
CVE-2021-3517
CVE-2021-3518
CVE-2019-20388
Ubuntu 16.04 LTS: LZ4 vulnerability (USN-4968-2) CVE-2021-3520 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS: Intel Microcode vulnerabilities (USN-4985-1) CVE-2020-24512 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2020-24513
CVE-2020-24511
CVE-2020-24489
Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) CVE-2021-31535 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS: libx11 vulnerability (USN-4966-2) CVE-2021-31535 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS: GNU C Library vulnerabilities (USN-4954-1) CVE-2009-5155 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2020-6096
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04: Bind vulnerabilities (USN-4929-1) CVE-2021-25215 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2021-25214
CVE-2021-25216
Ubuntu 16.04 LTS / 18.04 LTS: Linux kernel vulnerabilities (USN-4916-1) CVE-2021-3493 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2021-29154
Ubuntu 16.04 LTS: Linux kernel vulnerabilities (USN-4904-1) CVE-2017-16644 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2019-16231
CVE-2021-26930
CVE-2021-28038
CVE-2019-19061
CVE-2021-26931
CVE-2017-5967
CVE-2015-1350
CVE-2019-16232
CVE-2021-20261
CVE-2018-13095
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Nettle vulnerability (USN-4906-1) CVE-2021-20305 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: curl vulnerabilities (USN-4898-1) CVE-2021-22890 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2021-22876
Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10: Bind vulnerability (USN-4737-1) CVE-2020-8625 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
mbedtls CVE-2018-0497 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Dell Technologies recommande à tous ses clients de tenir compte à la fois du score de base CVSS et de tous les scores temporels et environnementaux pertinents qui pourraient avoir une incidence sur la gravité potentielle associée à une vulnérabilité de sécurité particulière.

Produits touchés et correction

Product Affected Versions Updated Version Link to Update
Dell EMC CloudLink Versions before 7.1.1 7.1.1 https://www.dell.com/support/home/en-us/product-support/product/cloudlink-securevm/drivers

Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
Product Affected Versions Updated Version Link to Update
Dell EMC CloudLink Versions before 7.1.1 7.1.1 https://www.dell.com/support/home/en-us/product-support/product/cloudlink-securevm/drivers

Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.

Historique de révision

RevisionDateDescription
1.02021-11-01Initial Release

Renseignements connexes

Produits touchés

CloudLink

Produits

CloudLink SecureVM, Product Security Information
Propriétés de l’article
Numéro d’article: 000193031
Type d’article: Dell Security Advisory
Dernière modification: 18 sept. 2025
Obtenez des réponses à vos questions auprès d’autre utilisateurs de Dell
Services de soutien
Vérifiez si votre appareil est couvert par les services de soutien.