DSA-2022-216: Dell Enterprise Hybrid Cloud Security Update for Multiple Third-Party Component Vulnerabilities
Résumé: Dell Enterprise Hybrid Cloud remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Cet article concerne
Cet article ne concerne pas
Cet article n’est associé à aucun produit spécifique.
Toutes les versions du produit ne sont pas identifiées dans cet article.
Impact
Critical
Détails
| Third-party Component | CVE | More information |
| VMware vRealize Operations | CVE-2022-31672 | VMSA-2022-0022 |
| CVE-2022-31673 | ||
| CVE-2022-31674 | ||
| CVE-2022-31675 | ||
| VMware vRealize Automation | CVE-2022-31656 | VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-31657 | ||
| CVE-2022-31658 | ||
| CVE-2022-31659 | ||
| CVE-2022-31660 | ||
| CVE-2022-31661 | ||
| CVE-2022-31662 | ||
| CVE-2022-31663 | ||
| CVE-2022-31664 | ||
| CVE-2022-31665 | ||
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-29901 | VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-28693 | ||
| CVE-2022-23816 | ||
| CVE-2022-23825 | ||
| VMware vRealize Log Insight 8.x | CVE-2022-31654 | VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
| CVE-2022-31655 | ||
| VMware Server (6.5, 6.7, and 7.0) | CVE-2022-22982 | VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-21123 | VMSA-2022-0016, see KB articles for workarounds and fixes. |
| CVE-2022-21125 | ||
| CVE-2022-21166 |
See the security advisories that are listed in the table above for details on vulnerabilities and remediation.
Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
| Third-party Component | CVE | More information |
| VMware vRealize Operations | CVE-2022-31672 | VMSA-2022-0022 |
| CVE-2022-31673 | ||
| CVE-2022-31674 | ||
| CVE-2022-31675 | ||
| VMware vRealize Automation | CVE-2022-31656 | VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-31657 | ||
| CVE-2022-31658 | ||
| CVE-2022-31659 | ||
| CVE-2022-31660 | ||
| CVE-2022-31661 | ||
| CVE-2022-31662 | ||
| CVE-2022-31663 | ||
| CVE-2022-31664 | ||
| CVE-2022-31665 | ||
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-29901 | VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-28693 | ||
| CVE-2022-23816 | ||
| CVE-2022-23825 | ||
| VMware vRealize Log Insight 8.x | CVE-2022-31654 | VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
| CVE-2022-31655 | ||
| VMware Server (6.5, 6.7, and 7.0) | CVE-2022-22982 | VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-21123 | VMSA-2022-0016, see KB articles for workarounds and fixes. |
| CVE-2022-21125 | ||
| CVE-2022-21166 |
See the security advisories that are listed in the table above for details on vulnerabilities and remediation.
Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Produits concernés et mesure corrective
| Product | Affected Versions | Updated Versions |
| Dell Enterprise Hybrid Cloud | Versions before 4.1.2 | 4.1.2 |
The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
- Dell Enterprise Hybrid Cloud version 4.1.2
Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
| Product | Affected Versions | Updated Versions |
| Dell Enterprise Hybrid Cloud | Versions before 4.1.2 | 4.1.2 |
The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
- Dell Enterprise Hybrid Cloud version 4.1.2
Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Historique des révisions
| Revision | Date | Description |
| 1.0 | 2022-08-10 | Initial Release |
Informations connexes
Mention légale
Produits concernés
Enterprise Hybrid Cloud, Enterprise Hybrid Cloud, Federation End User Computing Solution for Federation Enterprise Hybrid Cloud, Product Security InformationPropriétés de l’article
Numéro d’article: 000202365
Type d’article: Dell Security Advisory
Dernière modification: 19 Sep 2025
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.