DSA-2022-216: Dell Enterprise Hybrid Cloud Security Update for Multiple Third-Party Component Vulnerabilities

Résumé: Dell Enterprise Hybrid Cloud remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Impact

Critical

Détails

Third-party Component CVE More information
VMware vRealize Operations CVE-2022-31672 VMSA-2022-0022
CVE-2022-31673
CVE-2022-31674
CVE-2022-31675
VMware vRealize Automation CVE-2022-31656 VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-31657
CVE-2022-31658
CVE-2022-31659
CVE-2022-31660
CVE-2022-31661
CVE-2022-31662
CVE-2022-31663
CVE-2022-31664
CVE-2022-31665
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-29901 VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-28693
CVE-2022-23816
CVE-2022-23825
VMware vRealize Log Insight 8.x CVE-2022-31654 VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version.
CVE-2022-31655
VMware Server (6.5, 6.7, and 7.0) CVE-2022-22982 VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available.
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-21123 VMSA-2022-0016, see KB articles for workarounds and fixes.
CVE-2022-21125
CVE-2022-21166


See the security advisories that are listed in the table above for details on vulnerabilities and remediation.

Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Third-party Component CVE More information
VMware vRealize Operations CVE-2022-31672 VMSA-2022-0022
CVE-2022-31673
CVE-2022-31674
CVE-2022-31675
VMware vRealize Automation CVE-2022-31656 VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-31657
CVE-2022-31658
CVE-2022-31659
CVE-2022-31660
CVE-2022-31661
CVE-2022-31662
CVE-2022-31663
CVE-2022-31664
CVE-2022-31665
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-29901 VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams.
CVE-2022-28693
CVE-2022-23816
CVE-2022-23825
VMware vRealize Log Insight 8.x CVE-2022-31654 VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version.
CVE-2022-31655
VMware Server (6.5, 6.7, and 7.0) CVE-2022-22982 VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available.
VMware ESXi (6.5, 6.7, and 7.0) CVE-2022-21123 VMSA-2022-0016, see KB articles for workarounds and fixes.
CVE-2022-21125
CVE-2022-21166


See the security advisories that are listed in the table above for details on vulnerabilities and remediation.

Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Dell Technologies recommande à tous les clients de prendre en compte à la fois le score de base CVSS et les scores temporels et environnementaux pertinents qui peuvent avoir un impact sur la gravité potentielle associée à une faille de sécurité donnée.

Produits concernés et mesure corrective

Product Affected Versions Updated Versions
Dell Enterprise Hybrid Cloud Versions before 4.1.2 4.1.2

The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
  • Dell Enterprise Hybrid Cloud version 4.1.2

Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.

Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.

ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Product Affected Versions Updated Versions
Dell Enterprise Hybrid Cloud Versions before 4.1.2 4.1.2

The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
  • Dell Enterprise Hybrid Cloud version 4.1.2

Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.

Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.

ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.

Historique des révisions

RevisionDateDescription
1.02022-08-10Initial Release

Informations connexes

Produits concernés

Enterprise Hybrid Cloud, Enterprise Hybrid Cloud, Federation End User Computing Solution for Federation Enterprise Hybrid Cloud, Product Security Information
Propriétés de l’article
Numéro d’article: 000202365
Type d’article: Dell Security Advisory
Dernière modification: 19 Sep 2025
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.