DSA-2023-320: Security Update for Dell VxRail Multiple Vulnerabilities – 7.0.480
Sammendrag: Dell VxRail remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Denne artikkelen gjelder for
Denne artikkelen gjelder ikke for
Denne artikkelen er ikke knyttet til noe bestemt produkt.
Det er ikke produktversjonene som identifiseres i denne artikkelen.
Påvirkning
Critical
Detaljer
| Third-Party Component | CVEs | More Information |
| Dell PowerEdge BIOS | CVE-2023-32461, CVE-2023-0215, CVE-2023-0286, CVE-2022-4304, CVE-2022-4450, CVE-2023-25537, CVE-2022-33894, CVE-2022-38087, CVE-2022-40982, CVE-2022-38083, CVE-2022-43505, CVE-2023-23908, CVE-2022-41804, CVE-2021-38578, CVE-2024-0172 | DSA-2023-134, DSA-2023-098, DSA-2023-096, DSA-2023-206, DSA-2023-097, DSA-2024-035 |
| Dell PowerEdge Intel E810 Series Firmware | CVE-2023-22276, CVE-2023-25775 | DSA-2023-208 |
| Dell PowerEdge Intel E810 Series Firmware | CVE-2023-28376 | DSA-2023-378 |
| Dell PowerEdge AMD BIOS | CVE-2023-20566, CVE-2023-20533, CVE-2023-20526, CVE-2023-20521, CVE-2023-20519, CVE-2022-23830, CVE-2022-23820, CVE-2021-46774, CVE-2021-46766, CVE-2021-26345 | DSA-2023-355 |
| OpenSSL | CVE-2023-2650 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| OpenSSH | CVE-2023-38408, CVE-2016-20012 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| PostgreSQL | CVE-2023-2454, CVE-2023-2455 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| VMware vCenter | CVE-2023-34048, CVE-2023-34056 | For more information, see VMSA-2023-0023 |
| Python Celery | CVE-2021-23727 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| SUSE | CVE-2023-4156,CVE-2023-4004,CVE-2023-39418,CVE-2023-39417,CVE-2023-38408,CVE-2023-3817,CVE-2023-3812,CVE-2023-3776,CVE-2023-3611,CVE-2023-3609,CVE-2023-36054,CVE-2023-35829,CVE-2023-35828,CVE-2023-35824,CVE-2023-35823,CVE-2023-35788,CVE-2023-3567,CVE-2023-35001,CVE-2023-34969,CVE-2023-3446,CVE-2023-3390,CVE-2023-3389,CVE-2023-3358,CVE-2023-3357,CVE-2023-3338,CVE-2023-33288,CVE-2023-32681,CVE-2023-3268,CVE-2023-32461,CVE-2023-32269,CVE-2023-32233,CVE-2023-3212,CVE-2023-32001,CVE-2023-3161,CVE-2023-3159,CVE-2023-31484,CVE-2023-31436,CVE-2023-3141,CVE-2023-3138,CVE-2023-31248,CVE-2023-3117,CVE-2023-3111,CVE-2023-31084,CVE-2023-31083,CVE-2023-3090,CVE-2023-30772,CVE-2023-30630,CVE-2023-30456,CVE-2023-3006,CVE-2023-2985,CVE-2023-2975,CVE-2023-2953,CVE-2023-29491,CVE-2023-29469,CVE-2023-29383,CVE-2023-2911,CVE-2023-28772,CVE-2023-28709,CVE-2023-28708,CVE-2023-28642,CVE-2023-2860,CVE-2023-28487,CVE-2023-28486,CVE-2023-28484,CVE-2023-28466,CVE-2023-28464,CVE-2023-28410,CVE-2023-28370,CVE-2023-28328,CVE-2023-28327,CVE-2023-28322,CVE-2023-28321,CVE-2023-28320,CVE-2023-28319,CVE-2023-2828,CVE-2023-27561,CVE-2023-27538,CVE-2023-27536,CVE-2023-27535,CVE-2023-27534,CVE-2023-27533,CVE-2023-27320,CVE-2023-26555,CVE-2023-26554,CVE-2023-26553,CVE-2023-26552,CVE-2023-26551,CVE-2023-26545,CVE-2023-2650,CVE-2023-2610,CVE-2023-2609,CVE-2023-2603,CVE-2023-2602,CVE-2023-25809,CVE-2023-25775,CVE-2023-25537,CVE-2023-25193,CVE-2023-25180,CVE-2023-25173,CVE-2023-25153,CVE-2023-2513,CVE-2023-25012,CVE-2023-24998,CVE-2023-2483,CVE-2023-24593,CVE-2023-2455,CVE-2023-2454,CVE-2023-24329,CVE-2023-2426,CVE-2023-23931,CVE-2023-23586,CVE-2023-23559,CVE-2023-23006,CVE-2023-23004,CVE-2023-23001,CVE-2023-23000,CVE-2023-22998,CVE-2023-22995,CVE-2023-2269,CVE-2023-2235,CVE-2023-22276,CVE-2023-22049,CVE-2023-22045,CVE-2023-22044,CVE-2023-22041,CVE-2023-22036,CVE-2023-22006,CVE-2023-21968,CVE-2023-21967,CVE-2023-21954,CVE-2023-2194,CVE-2023-21939,CVE-2023-21938,CVE-2023-21937,CVE-2023-21930,CVE-2023-21843,CVE-2023-21835,CVE-2023-2176,CVE-2023-2166,CVE-2023-2162,CVE-2023-2156,CVE-2023-21400,CVE-2023-2124,CVE-2023-21102,CVE-2023-20867,CVE-2023-20593,CVE-2023-20569,CVE-2023-2019,CVE-2023-2008,CVE-2023-2002,CVE-2023-1998,CVE-2023-1990,CVE-2023-1989,CVE-2023-1981,CVE-2023-1872,CVE-2023-1855,CVE-2023-1838,CVE-2023-1829,CVE-2023-1670,CVE-2023-1652,CVE-2023-1637,CVE-2023-1611,CVE-2023-1582,CVE-2023-1513,CVE-2023-1410,CVE-2023-1390,CVE-2023-1387,CVE-2023-1382,CVE-2023-1380,CVE-2023-1355,CVE-2023-1281,CVE-2023-1264,CVE-2023-1255,CVE-2023-1249,CVE-2023-1195,CVE-2023-1175,CVE-2023-1170,CVE-2023-1127,CVE-2023-1118,CVE-2023-1095,CVE-2023-1079,CVE-2023-1078,CVE-2023-1077,CVE-2023-1076,CVE-2023-1075,CVE-2023-0922,CVE-2023-0687,CVE-2023-0597,CVE-2023-0590,CVE-2023-0512,CVE-2023-0466,CVE-2023-0465,CVE-2023-0464,CVE-2023-0461,CVE-2023-0459,CVE-2023-0394,CVE-2023-0386,CVE-2023-0361,CVE-2023-0286,CVE-2023-0215,CVE-2023-0045,CVE-2022-4904,CVE-2022-4899,CVE-2022-48303,CVE-2022-4744,CVE-2022-46908,CVE-2022-46146,CVE-2022-45919,CVE-2022-45887,CVE-2022-45886,CVE-2022-45885,CVE-2022-45884,CVE-2022-45143,CVE-2022-45061,CVE-2022-4450,CVE-2022-43945,CVE-2022-4304,CVE-2022-4269,CVE-2022-41862,CVE-2022-41715,CVE-2022-40982,CVE-2022-40735,CVE-2022-38096,CVE-2022-38087,CVE-2022-37026,CVE-2022-36280,CVE-2022-36109,CVE-2022-36062,CVE-2022-35957,CVE-2022-3566,CVE-2022-3555,CVE-2022-3523,CVE-2022-33894,CVE-2022-32149,CVE-2022-3171,CVE-2022-31107,CVE-2022-31097,CVE-2022-29824,CVE-2022-28737,CVE-2022-27664,CVE-2022-23471,CVE-2022-2196,CVE-2022-1941,CVE-2022-0185,CVE-2022-0155,CVE-2021-43138,CVE-2021-3923,CVE-2021-3918,CVE-2021-38578,CVE-2021-3807,CVE-2021-3541,CVE-2021-3246,CVE-2021-30560,CVE-2021-30465,CVE-2021-29650,CVE-2021-22570,CVE-2021-22569,CVE-2020-7753,CVE-2020-36694,CVE-2020-36691,CVE-2020-36242,CVE-2020-25659,CVE-2020-23903,CVE-2020-12762,CVE-2019-20916,CVE-2019-19921,CVE-2019-15133,CVE-2018-13139,CVE-2018-11490,CVE-2018-1000518,CVE-2017-5753,CVE-2016-3977,CVE-2016-20012,CVE-2007-4559 | For more information, see the SUSE Website https://www.suse.com/security/cve/ |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2023-32463 | Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction | 3.4 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2023-32463 | Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction | 3.4 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
Berørte produkter og utbedring
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell EMC VxRail Appliance | Versions prior to 7.0.480 | Version 7.0.480 | VxRail 7.0.480 |
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell EMC VxRail Appliance | Versions prior to 7.0.480 | Version 7.0.480 | VxRail 7.0.480 |
Endringshistorikk
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2023-10-12 | Initial Release |
| 2.0 | 2023-10-13 | Updated for enhanced presentation with no changes to content. |
| 3.0 | 2023-10-27 | Amended to add CVE remediated in VMSA-2023-0023 |
| 4.0 | 2023-11-22 | Amended for Intel firmware and PowerEdge BIOS AMD vulnerabilities |
| 5.0 | 2024-04-11 | Added CVE-2024-0172 |
| 6.0 | 2024-04-11 | Updated for enhanced presentation with no change to content. |
Relatert informasjon
Juridisk ansvarsfraskrivelse
Berørte produkter
VxRail, CloudArray Virtual Edition for VxRail Appliance, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes
, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560, VxRail E560 VCF, VxRail E560F, VxRail E560F VCF, VxRail E560N, VxRail E560N VCF, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560 VCF, VxRail G560F, VxRail G560F VCF, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570 VCF, VxRail P570F, VxRail P570F VCF, VxRail P580N, VxRail P580N VCF, VxRail P670F, VxRail P670N, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S570 VCF, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570 VCF, VxRail V570F, VxRail V570F VCF, VXRAIL V670F, VxRail VD-4000R, VxRail VD-4000W, VxRail VD-4000Z, VxRail VD-4510C, VxRail VD-4520C, VxRail VD Series Nodes, VxRail VE-660, VxRail VP-760
...
Artikkelegenskaper
Artikkelnummer: 000218139
Artikkeltype: Dell Security Advisory
Sist endret: 19 sep. 2025
Få svar på spørsmålene dine fra andre Dell-brukere
Støttetjenester
Sjekk om enheten din er dekket av støttetjenestene.