DSA-2022-265: Dell iDRAC8 and Dell iDRAC9 Security Update for a RACADM Vulnerability
Riepilogo: Dell iDRAC8 and Dell iDRAC9 remediation are available for an input validation vulnerability that may be exploited by high privileged malicious users to bypass the firmware lock-down and perform a firmware update. ...
Questo articolo si applica a
Questo articolo non si applica a
Questo articolo non è legato a un prodotto specifico.
Non tutte le versioni del prodotto sono identificate in questo articolo.
Impatto
Low
Dettagli
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
Prodotti interessati e correzione
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
Cronologia delle revisioni
| Revision | Date | Description |
| 1.0 | 2022-11-14 | Initial release |
| 2.0 | 2023-04-03 | Updated "Affected Products and Remediation" section with iDRAC8 Updated Version |
| 3.0 | 2023-08-11 | Tagged Azure Stack Hub |
Ringraziamenti
Dell Technologies would like to thank the Cloud Compute Security Team from Google for reporting this issue.
Informazioni correlate
Dichiarazione di non responsabilità
Prodotti interessati
iDRAC8, iDRAC9, Integrated System for Microsoft Azure Stack Hub, Integrated System for Microsoft Azure Stack Hub 13G, Integrated System for Microsoft Azure Stack Hub 14G, iDRAC9 - 3.0x Series, iDRAC9 - 3.1x Series, iDRAC9 - 3.2x Series
, iDRAC9 - 3.3x Series, iDRAC9 - 3.4x Series, iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series, iDRAC9 - 6.xx Series, Product Security Information
...
Proprietà dell'articolo
Numero articolo: 000205346
Tipo di articolo: Dell Security Advisory
Ultima modifica: 11 ago 2023
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.