Impact
High
Gegevens
Third-party Component |
CVE |
More information |
VMware vCenter Server 6.5 |
CVE-2022-31680 |
VMSA-2022-0025 See VMware KB article for further details. VxRail and VxBlock engineering teams must validate the fix. |
VMware ESXi 6.5, 6.7, and 7.0 |
CVE-2022-31681 |
VMSA-2022-0025 See VMware KB article for further details. VxRail and VxBlock engineering teams must validate the fix. |
VMWare vCenter Server 6.5, 6.7 & 7.0 |
CVE-2022-31697 |
VMSA-2022-0030 See VMware KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31698 |
VMware ESXi 6.5, 6.7 & 7.0 |
CVE-2022-31696 |
VMSA-2022-0030 See VMware KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31699 |
Third-party Component |
CVE |
More information |
VMware vCenter Server 6.5 |
CVE-2022-31680 |
VMSA-2022-0025 See VMware KB article for further details. VxRail and VxBlock engineering teams must validate the fix. |
VMware ESXi 6.5, 6.7, and 7.0 |
CVE-2022-31681 |
VMSA-2022-0025 See VMware KB article for further details. VxRail and VxBlock engineering teams must validate the fix. |
VMWare vCenter Server 6.5, 6.7 & 7.0 |
CVE-2022-31697 |
VMSA-2022-0030 See VMware KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31698 |
VMware ESXi 6.5, 6.7 & 7.0 |
CVE-2022-31696 |
VMSA-2022-0030 See VMware KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31699 |
Dell Technologies raadt aan dat alle klanten rekening houden met zowel de basisscore van CVSS als alle relevante tijdelijke en omgevingsscores die gevolgen kunnen hebben voor de mogelijke ernst van de specifieke beveiligingsproblemen.
Product |
Affected Versions |
Updated Versions |
Dell Enterprise Hybrid Cloud |
Versions before 4.1.2 |
4.1.2 |
Dell Technologies recommends all customers upgrade at the earliest opportunity, see VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Product |
Affected Versions |
Updated Versions |
Dell Enterprise Hybrid Cloud |
Versions before 4.1.2 |
4.1.2 |
Dell Technologies recommends all customers upgrade at the earliest opportunity, see VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Revisiegeschiedenis
Revision | Date | Description |
1.0 | 2022-11-21 | Initial Release |
1.1 | 2023-01-09 | Added VMSA-2022-0030 |
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
Getroffen producten
Enterprise Hybrid Cloud, Enterprise Hybrid Cloud, Federation End User Computing Solution for Federation Enterprise Hybrid Cloud, Product Security Information