Numéro d’article: 000132873
Critical
Third-party Component |
CVE(s) |
More information |
---|---|---|
Teradici Tera2 Zero Client Teradici Tera2 Remote Workstation Card |
CVE-2020-11896 |
See the Teradici advisory TERA-SA-000056 for additional details.
See also additional details in CERT/CC Vulnerability Note VU#257161.
See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
CVE-2020-11898 |
||
CVE-2020-11900 |
||
CVE-2020-11901 |
||
CVE-2020-11902 |
||
CVE-2020-11904 |
||
CVE-2020-11905 |
||
CVE-2020-11906 |
||
CVE-2020-11907 |
||
CVE-2020-11909 |
||
CVE-2020-119010 |
||
CVE-2020-119011 |
||
CVE-2020-119012 |
||
CVE-2020-119013 |
||
CVE-2020-119014 |
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Third-party Component |
CVE(s) |
More information |
---|---|---|
Teradici Tera2 Zero Client Teradici Tera2 Remote Workstation Card |
CVE-2020-11896 |
See the Teradici advisory TERA-SA-000056 for additional details.
See also additional details in CERT/CC Vulnerability Note VU#257161.
See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
CVE-2020-11898 |
||
CVE-2020-11900 |
||
CVE-2020-11901 |
||
CVE-2020-11902 |
||
CVE-2020-11904 |
||
CVE-2020-11905 |
||
CVE-2020-11906 |
||
CVE-2020-11907 |
||
CVE-2020-11909 |
||
CVE-2020-119010 |
||
CVE-2020-119011 |
||
CVE-2020-119012 |
||
CVE-2020-119013 |
||
CVE-2020-119014 |
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Dell Technologies recommande à tous les clients de prendre en compte à la fois le score de base CVSS et les scores temporels et environnementaux pertinents qui peuvent avoir un impact sur la gravité potentielle associée à une faille de sécurité donnée.
Refer to the table in the 'Additional Info' section for Dell Client releases containing a resolution to the vulnerability. Dell recommends all customers update to the latest firmware version at the earliest opportunity.
Refer to the table in the 'Additional Info' section for Dell Client releases containing a resolution to the vulnerability. Dell recommends all customers update to the latest firmware version at the earliest opportunity.
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
Dell Client Consumer and Commercial Platforms Affected
The following is a list of impacted products, firmware update versions and release dates:
Product |
Firmware Update Version |
Release Date (MM/DD/YYYY) |
---|---|---|
Precision 3630 Tower |
17.05 for customers without an all access subscription
2020.04 for customers with an all access subscription |
June 16, 2020 |
Precision 3630 XL Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 3430 XL |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 3431 Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 5820 Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 5820 XL Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 7820 Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 7820 XL Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 7920 Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 7920 XL Tower |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 7920 Rack |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 7920 XL Rack |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 3930 Rack |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Precision 3930 XL Rack |
17.05 for customers who don’t have all access subscription
2020.04 for customers who have all access subscription |
June 16, 2020 |
Wyse 5030 Zero Client (Wyse P25) |
17.05 for customers without an all access subscription
2020.04 for customers with an all access subscription |
June 16, 2020 |
Wyse 5050 All-In-One Zero Client |
17.05 for customers without an all access subscription
2020.04 for customers with an all access subscription |
June 16, 2020 |
Wyse 7030 Zero Client (Wyse P45) |
17.05 for customers without an all access subscription
2020.04 for customers with an all access subscription |
June 16, 2020 |
Les informations contenues dans ce conseil de sécurité Dell Technologies doivent être lues et utilisées pour vous aider à éviter les situations qui peuvent découler des problèmes décrits dans le présent document. Dell Technologies publie des conseils de sécurité pour attirer l’attention des utilisateurs du ou des produits concernés sur des informations importantes en matière de sécurité. Dell Technologies évalue le risque en se basant sur la moyenne des risques d’un ensemble de systèmes installés. Cette évaluation peut ne pas représenter le risque réel pour votre installation locale et votre environnement individuel. Il est recommandé à tous les utilisateurs de déterminer si ces informations sont applicables à leurs environnements individuels et de prendre les mesures appropriées. Les informations contenues dans le présent document sont fournies « en l’état », sans garantie d’aucune sorte. Dell Technologies décline toute garantie, expresse ou implicite, notamment les garanties de qualité marchande, d’adéquation à un usage particulier, de propriété et d’absence de contrefaçon. Dell Technologies, ses sociétés affiliées ou ses fournisseurs ne sauraient en aucun cas être tenus responsables de tout dommage résultant ou lié aux informations contenues dans le présent document ou aux actions que vous décidez de prendre sur la base de ce dernier, y compris tout dommage direct, indirect, fortuit, consécutif, perte de bénéfices ou dommages spéciaux, et ce, même si Dell Technologies, ses sociétés affiliées ou ses fournisseurs ont été avertis de la possibilité de tels dommages. Certaines juridictions n’autorisent pas la limitation ou l’exclusion de responsabilité en cas de dommages consécutifs ou accidentels, la limitation susmentionnée s’appliquant ainsi dans la mesure permise par la loi.
Product Security Information
21 févr. 2021
4
Dell Security Advisory