Critical
Third-Party Component | CVEs | More Information |
Dell PowerEdge BIOS | CVE-2023-32461, CVE-2023-0215, CVE-2023-0286, CVE-2022-4304, CVE-2022-4450, CVE-2023-25537, CVE-2022-33894, CVE-2022-38087, CVE-2022-40982, CVE-2022-38083, CVE-2022-43505, CVE-2023-23908, CVE-2022-41804, CVE-2021-38578, CVE-2024-0172 | DSA-2023-134, DSA-2023-098, DSA-2023-096, DSA-2023-206, DSA-2023-097, DSA-2024-035 |
Dell PowerEdge Intel E810 Series Firmware | CVE-2023-22276, CVE-2023-25775 | DSA-2023-208 |
Dell PowerEdge Intel E810 Series Firmware | CVE-2023-28376 | DSA-2023-378 |
Dell PowerEdge AMD BIOS | CVE-2023-20566, CVE-2023-20533, CVE-2023-20526, CVE-2023-20521, CVE-2023-20519, CVE-2022-23830, CVE-2022-23820, CVE-2021-46774, CVE-2021-46766, CVE-2021-26345 | DSA-2023-355 |
OpenSSL | CVE-2023-2650 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
OpenSSH | CVE-2023-38408, CVE-2016-20012 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
PostgreSQL | CVE-2023-2454, CVE-2023-2455 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
VMware vCenter | CVE-2023-34048, CVE-2023-34056 | For more information, see VMSA-2023-0023 |
Python Celery | CVE-2021-23727 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
SUSE | CVE-2023-4156,CVE-2023-4004,CVE-2023-39418,CVE-2023-39417,CVE-2023-38408,CVE-2023-3817,CVE-2023-3812,CVE-2023-3776,CVE-2023-3611,CVE-2023-3609,CVE-2023-36054,CVE-2023-35829,CVE-2023-35828,CVE-2023-35824,CVE-2023-35823,CVE-2023-35788,CVE-2023-3567,CVE-2023-35001,CVE-2023-34969,CVE-2023-3446,CVE-2023-3390,CVE-2023-3389,CVE-2023-3358,CVE-2023-3357,CVE-2023-3338,CVE-2023-33288,CVE-2023-32681,CVE-2023-3268,CVE-2023-32461,CVE-2023-32269,CVE-2023-32233,CVE-2023-3212,CVE-2023-32001,CVE-2023-3161,CVE-2023-3159,CVE-2023-31484,CVE-2023-31436,CVE-2023-3141,CVE-2023-3138,CVE-2023-31248,CVE-2023-3117,CVE-2023-3111,CVE-2023-31084,CVE-2023-31083,CVE-2023-3090,CVE-2023-30772,CVE-2023-30630,CVE-2023-30456,CVE-2023-3006,CVE-2023-2985,CVE-2023-2975,CVE-2023-2953,CVE-2023-29491,CVE-2023-29469,CVE-2023-29383,CVE-2023-2911,CVE-2023-28772,CVE-2023-28709,CVE-2023-28708,CVE-2023-28642,CVE-2023-2860,CVE-2023-28487,CVE-2023-28486,CVE-2023-28484,CVE-2023-28466,CVE-2023-28464,CVE-2023-28410,CVE-2023-28370,CVE-2023-28328,CVE-2023-28327,CVE-2023-28322,CVE-2023-28321,CVE-2023-28320,CVE-2023-28319,CVE-2023-2828,CVE-2023-27561,CVE-2023-27538,CVE-2023-27536,CVE-2023-27535,CVE-2023-27534,CVE-2023-27533,CVE-2023-27320,CVE-2023-26555,CVE-2023-26554,CVE-2023-26553,CVE-2023-26552,CVE-2023-26551,CVE-2023-26545,CVE-2023-2650,CVE-2023-2610,CVE-2023-2609,CVE-2023-2603,CVE-2023-2602,CVE-2023-25809,CVE-2023-25775,CVE-2023-25537,CVE-2023-25193,CVE-2023-25180,CVE-2023-25173,CVE-2023-25153,CVE-2023-2513,CVE-2023-25012,CVE-2023-24998,CVE-2023-2483,CVE-2023-24593,CVE-2023-2455,CVE-2023-2454,CVE-2023-24329,CVE-2023-2426,CVE-2023-23931,CVE-2023-23586,CVE-2023-23559,CVE-2023-23006,CVE-2023-23004,CVE-2023-23001,CVE-2023-23000,CVE-2023-22998,CVE-2023-22995,CVE-2023-2269,CVE-2023-2235,CVE-2023-22276,CVE-2023-22049,CVE-2023-22045,CVE-2023-22044,CVE-2023-22041,CVE-2023-22036,CVE-2023-22006,CVE-2023-21968,CVE-2023-21967,CVE-2023-21954,CVE-2023-2194,CVE-2023-21939,CVE-2023-21938,CVE-2023-21937,CVE-2023-21930,CVE-2023-21843,CVE-2023-21835,CVE-2023-2176,CVE-2023-2166,CVE-2023-2162,CVE-2023-2156,CVE-2023-21400,CVE-2023-2124,CVE-2023-21102,CVE-2023-20867,CVE-2023-20593,CVE-2023-20569,CVE-2023-2019,CVE-2023-2008,CVE-2023-2002,CVE-2023-1998,CVE-2023-1990,CVE-2023-1989,CVE-2023-1981,CVE-2023-1872,CVE-2023-1855,CVE-2023-1838,CVE-2023-1829,CVE-2023-1670,CVE-2023-1652,CVE-2023-1637,CVE-2023-1611,CVE-2023-1582,CVE-2023-1513,CVE-2023-1410,CVE-2023-1390,CVE-2023-1387,CVE-2023-1382,CVE-2023-1380,CVE-2023-1355,CVE-2023-1281,CVE-2023-1264,CVE-2023-1255,CVE-2023-1249,CVE-2023-1195,CVE-2023-1175,CVE-2023-1170,CVE-2023-1127,CVE-2023-1118,CVE-2023-1095,CVE-2023-1079,CVE-2023-1078,CVE-2023-1077,CVE-2023-1076,CVE-2023-1075,CVE-2023-0922,CVE-2023-0687,CVE-2023-0597,CVE-2023-0590,CVE-2023-0512,CVE-2023-0466,CVE-2023-0465,CVE-2023-0464,CVE-2023-0461,CVE-2023-0459,CVE-2023-0394,CVE-2023-0386,CVE-2023-0361,CVE-2023-0286,CVE-2023-0215,CVE-2023-0045,CVE-2022-4904,CVE-2022-4899,CVE-2022-48303,CVE-2022-4744,CVE-2022-46908,CVE-2022-46146,CVE-2022-45919,CVE-2022-45887,CVE-2022-45886,CVE-2022-45885,CVE-2022-45884,CVE-2022-45143,CVE-2022-45061,CVE-2022-4450,CVE-2022-43945,CVE-2022-4304,CVE-2022-4269,CVE-2022-41862,CVE-2022-41715,CVE-2022-40982,CVE-2022-40735,CVE-2022-38096,CVE-2022-38087,CVE-2022-37026,CVE-2022-36280,CVE-2022-36109,CVE-2022-36062,CVE-2022-35957,CVE-2022-3566,CVE-2022-3555,CVE-2022-3523,CVE-2022-33894,CVE-2022-32149,CVE-2022-3171,CVE-2022-31107,CVE-2022-31097,CVE-2022-29824,CVE-2022-28737,CVE-2022-27664,CVE-2022-23471,CVE-2022-2196,CVE-2022-1941,CVE-2022-0185,CVE-2022-0155,CVE-2021-43138,CVE-2021-3923,CVE-2021-3918,CVE-2021-38578,CVE-2021-3807,CVE-2021-3541,CVE-2021-3246,CVE-2021-30560,CVE-2021-30465,CVE-2021-29650,CVE-2021-22570,CVE-2021-22569,CVE-2020-7753,CVE-2020-36694,CVE-2020-36691,CVE-2020-36242,CVE-2020-25659,CVE-2020-23903,CVE-2020-12762,CVE-2019-20916,CVE-2019-19921,CVE-2019-15133,CVE-2018-13139,CVE-2018-11490,CVE-2018-1000518,CVE-2017-5753,CVE-2016-3977,CVE-2016-20012,CVE-2007-4559 | For more information, see the SUSE Website https://www.suse.com/security/cve/ |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2023-32463 | Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction | 3.4 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2023-32463 | Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction | 3.4 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
Product | Affected Versions | Remediated Versions | Link |
---|---|---|---|
Dell EMC VxRail Appliance | Versions prior to 7.0.480 | Version 7.0.480 | VxRail 7.0.480 |
Product | Affected Versions | Remediated Versions | Link |
---|---|---|---|
Dell EMC VxRail Appliance | Versions prior to 7.0.480 | Version 7.0.480 | VxRail 7.0.480 |
Revision | Date | Description |
---|---|---|
1.0 | 2023-10-12 | Initial Release |
2.0 | 2023-10-13 | Updated for enhanced presentation with no changes to content. |
3.0 | 2023-10-27 | Amended to add CVE remediated in VMSA-2023-0023 |
4.0 | 2023-11-22 | Amended for Intel firmware and PowerEdge BIOS AMD vulnerabilities |
5.0 | 2024-04-11 | Added CVE-2024-0172 |
6.0 | 2024-04-11 | Updated for enhanced presentation with no change to content. |