Ga naar hoofdinhoud
  • Snel en eenvoudig bestellen
  • Bestellingen en de verzendstatus bekijken
  • Een lijst met producten maken en openen
  • Beheer uw Dell EMC locaties, producten en contactpersonen op productniveau met Company Administration.

Artikelnummer: 000216530


DSA-2023-293: Security Update for Dell Networking MX Series Switches Vulnerabilities

Samenvatting: Dell Networking MX Series Switches remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Article content


Impact

Critical

Gegevens

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-28078 Dell OS10 Networking Switches, versions 10.5.2.x and above, when configured with VLT or Smart Fabric mode contains an improper restriction of communication channel to intended endpoints vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible denial of service. This is a critical severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity. 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2023-32462 Dell OS10 Networking Switches, versions 10.5.2.x and above, contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system take over. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-28078 Dell OS10 Networking Switches, versions 10.5.2.x and above, when configured with VLT or Smart Fabric mode contains an improper restriction of communication channel to intended endpoints vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible denial of service. This is a critical severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity. 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2023-32462 Dell OS10 Networking Switches, versions 10.5.2.x and above, contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system take over. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies raadt aan dat alle klanten rekening houden met zowel de basisscore van CVSS als alle relevante tijdelijke en omgevingsscores die gevolgen kunnen hebben voor de mogelijke ernst van de specifieke beveiligingsproblemen.

Getroffen producten en herstel

Product Software/Firmware Affected Versions Remediated Versions Link
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 Version 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Product Software/Firmware Affected Versions Remediated Versions Link
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX5108n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 Version 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.4.9 Version 10.5.4.9 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers
Dell EMC Networking MX9116n Dell Networking MX SmartFabric OS10 Versions prior to 10.5.5.4 10.5.5.4 or later https://www.dell.com/support/home/product-support/product/poweredge-mx7000/drivers

Bevestigingen

CVE-2023-28078: Dell Technologies would like to thank Rafael Schaefer, ERNW Enno Rey Netzwerke GmbH for reporting this issue.
 

Revisiegeschiedenis

RevisionDateDescription
1.02023-08-07Initial release

 

Verwante informatie

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide


Artikeleigenschappen


Getroffen product

Dell EMC Networking MX5108n, Dell EMC Networking MX9116n

Datum laatst gepubliceerd

08 aug. 2023

Versie

1

Artikeltype

Dell Security Advisory