DSA-2024-274: Security Update for Dell Networking OS10 Vulnerabilities
Résumé: Dell Networking OS10 remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Cet article concerne
Cet article ne concerne pas
Cet article n’est associé à aucun produit spécifique.
Toutes les versions du produit ne sont pas identifiées dans cet article.
Impact
High
Détails
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2024-37125 | Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x,10.5.3.x, contains an Uncontrolled Resource Consumption vulnerability. A remote unauthenticated host could potentially exploit this vulnerability leading to a denial of service. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| CVE-2024-39577 | Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability leading to code execution. |
7.1 | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2024-37125 | Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x,10.5.3.x, contains an Uncontrolled Resource Consumption vulnerability. A remote unauthenticated host could potentially exploit this vulnerability leading to a denial of service. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| CVE-2024-39577 | Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability leading to code execution. |
7.1 | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
Produits concernés et mesure corrective
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell Networking OS10 | 10.5.6.x | 10.5.6.4 | SmartFabric OS10 downloads page |
| Dell Networking OS10 | 10.5.5.x | 10.5.5.11 | SmartFabric OS10 downloads page |
| Dell Networking OS10 | 10.5.4.x | 10.5.4.12 | SmartFabric OS10 downloads page |
| Dell Networking OS10 | 10.5.3.x | 10.5.3.11 | SmartFabric OS10 downloads page |
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell Networking OS10 | 10.5.6.x | 10.5.6.4 | SmartFabric OS10 downloads page |
| Dell Networking OS10 | 10.5.5.x | 10.5.5.11 | SmartFabric OS10 downloads page |
| Dell Networking OS10 | 10.5.4.x | 10.5.4.12 | SmartFabric OS10 downloads page |
| Dell Networking OS10 | 10.5.3.x | 10.5.3.11 | SmartFabric OS10 downloads page |
- SmartFabric OS10 downloads are also available from your Dell Digital Locker.
- The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
Solutions de contournement et mesures d’atténuation
| CVE ID | Workaround and Mitigation |
|---|---|
| CVE-2024-37125 | Shut the port through which the crafted packets are ingress into switch. |
Historique des révisions
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-09-26 | Initial Release |
Remerciements
- CVE-2024-39577: Dell would like to thank n3k From TIANGONG Team of Legendsec at QI-ANXIN Group for reporting this issue.
Informations connexes
Mention légale
Produits concernés
SmartFabric OS10 SoftwarePropriétés de l’article
Numéro d’article: 000228976
Type d’article: Dell Security Advisory
Dernière modification: 26 Sep 2024
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.