DSA-2022-265: Dell iDRAC8 and Dell iDRAC9 Security Update for a RACADM Vulnerability
요약: Dell iDRAC8 and Dell iDRAC9 remediation are available for an input validation vulnerability that may be exploited by high privileged malicious users to bypass the firmware lock-down and perform a firmware update. ...
이 문서는 다음에 적용됩니다.
이 문서는 다음에 적용되지 않습니다.
이 문서는 특정 제품과 관련이 없습니다.
모든 제품 버전이 이 문서에 나와 있는 것은 아닙니다.
영향
Low
세부 정보
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
영향을 받는 제품 및 문제 해결
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
개정 내역
| Revision | Date | Description |
| 1.0 | 2022-11-14 | Initial release |
| 2.0 | 2023-04-03 | Updated "Affected Products and Remediation" section with iDRAC8 Updated Version |
| 3.0 | 2023-08-11 | Tagged Azure Stack Hub |
감사의 말
Dell Technologies would like to thank the Cloud Compute Security Team from Google for reporting this issue.
관련 정보
법적 고지 사항
해당 제품
iDRAC8, iDRAC9, Integrated System for Microsoft Azure Stack Hub, Integrated System for Microsoft Azure Stack Hub 13G, Integrated System for Microsoft Azure Stack Hub 14G, iDRAC9 - 3.0x Series, iDRAC9 - 3.1x Series, iDRAC9 - 3.2x Series
, iDRAC9 - 3.3x Series, iDRAC9 - 3.4x Series, iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series, iDRAC9 - 6.xx Series, Product Security Information
...
문서 속성
문서 번호: 000205346
문서 유형: Dell Security Advisory
마지막 수정 시간: 11 8월 2023
다른 Dell 사용자에게 질문에 대한 답변 찾기
지원 서비스
디바이스에 지원 서비스가 적용되는지 확인하십시오.