Hopp til hovedinnhold
  • Legg inn bestillinger raskt og enkelt
  • Vis bestillinger og spor forsendelsesstatus
  • Opprett og få tilgang til en liste over produktene dine
  • Administrer Dell EMC-områder, produkter og kontakter for produktnivå ved hjelp av virksomhetsadministrering.

Artikkelnummer: 000218139


DSA-2023-320: Security Update for Dell VxRail Multiple Vulnerabilities – 7.0.480

Sammendrag: Dell VxRail remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Artikkelinnhold


Påvirkning

Critical

Detaljer

Third-Party Component CVEs More Information
Dell PowerEdge BIOS CVE-2023-32461, CVE-2023-0215, CVE-2023-0286, CVE-2022-4304, CVE-2022-4450, CVE-2023-25537, CVE-2022-33894, CVE-2022-38087, CVE-2022-40982, CVE-2022-38083, CVE-2022-43505, CVE-2023-23908, CVE-2022-41804, CVE-2021-38578 DSA-2023-134, DSA-2023-098, DSA-2023-096, DSA-2023-206, DSA-2023-097
PowerEdge Intel E810 Series Firmware CVE-2023-22276, CVE-2023-25775 DSA-2023-208
PowerEdge Intel E810 Series Firmware CVE-2023-28376 DSA-2023-378
AMD CVE-2023-20566, CVE-2023-20533, CVE-2023-20526, CVE-2023-20521, CVE-2023-20519, CVE-2022-23830, CVE-2022-23820, CVE-2021-46774, CVE-2021-46766, CVE-2021-26345 DSA-2023-355
OpenSSL CVE-2023-2650 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
OpenSSH CVE-2023-38408, CVE-2016-20012 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
PostgreSQL CVE-2023-2454, CVE-2023-2455 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
VMware vCenter CVE-2023-34048, CVE-2023-34056 For more information, see
VMSA-2023-0023
Python Celery CVE-2021-23727 See NVD link below for individual scores for each CVE.
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
SUSE CVE-2023-4156,CVE-2023-4004,CVE-2023-39418,CVE-2023-39417,CVE-2023-38408,CVE-2023-3817,CVE-2023-3812,CVE-2023-3776,CVE-2023-3611,CVE-2023-3609,CVE-2023-36054,CVE-2023-35829,CVE-2023-35828,CVE-2023-35824,CVE-2023-35823,CVE-2023-35788,CVE-2023-3567,CVE-2023-35001,CVE-2023-34969,CVE-2023-3446,CVE-2023-3390,CVE-2023-3389,CVE-2023-3358,CVE-2023-3357,CVE-2023-3338,CVE-2023-33288,CVE-2023-32681,CVE-2023-3268,CVE-2023-32461,CVE-2023-32269,CVE-2023-32233,CVE-2023-3212,CVE-2023-32001,CVE-2023-3161,CVE-2023-3159,CVE-2023-31484,CVE-2023-31436,CVE-2023-3141,CVE-2023-3138,CVE-2023-31248,CVE-2023-3117,CVE-2023-3111,CVE-2023-31084,CVE-2023-31083,CVE-2023-3090,CVE-2023-30772,CVE-2023-30630,CVE-2023-30456,CVE-2023-3006,CVE-2023-2985,CVE-2023-2975,CVE-2023-2953,CVE-2023-29491,CVE-2023-29469,CVE-2023-29383,CVE-2023-2911,CVE-2023-28772,CVE-2023-28709,CVE-2023-28708,CVE-2023-28642,CVE-2023-2860,CVE-2023-28487,CVE-2023-28486,CVE-2023-28484,CVE-2023-28466,CVE-2023-28464,CVE-2023-28410,CVE-2023-28370,CVE-2023-28328,CVE-2023-28327,CVE-2023-28322,CVE-2023-28321,CVE-2023-28320,CVE-2023-28319,CVE-2023-2828,CVE-2023-27561,CVE-2023-27538,CVE-2023-27536,CVE-2023-27535,CVE-2023-27534,CVE-2023-27533,CVE-2023-27320,CVE-2023-26555,CVE-2023-26554,CVE-2023-26553,CVE-2023-26552,CVE-2023-26551,CVE-2023-26545,CVE-2023-2650,CVE-2023-2610,CVE-2023-2609,CVE-2023-2603,CVE-2023-2602,CVE-2023-25809,CVE-2023-25775,CVE-2023-25537,CVE-2023-25193,CVE-2023-25180,CVE-2023-25173,CVE-2023-25153,CVE-2023-2513,CVE-2023-25012,CVE-2023-24998,CVE-2023-2483,CVE-2023-24593,CVE-2023-2455,CVE-2023-2454,CVE-2023-24329,CVE-2023-2426,CVE-2023-23931,CVE-2023-23586,CVE-2023-23559,CVE-2023-23006,CVE-2023-23004,CVE-2023-23001,CVE-2023-23000,CVE-2023-22998,CVE-2023-22995,CVE-2023-2269,CVE-2023-2235,CVE-2023-22276,CVE-2023-22049,CVE-2023-22045,CVE-2023-22044,CVE-2023-22041,CVE-2023-22036,CVE-2023-22006,CVE-2023-21968,CVE-2023-21967,CVE-2023-21954,CVE-2023-2194,CVE-2023-21939,CVE-2023-21938,CVE-2023-21937,CVE-2023-21930,CVE-2023-21843,CVE-2023-21835,CVE-2023-2176,CVE-2023-2166,CVE-2023-2162,CVE-2023-2156,CVE-2023-21400,CVE-2023-2124,CVE-2023-21102,CVE-2023-20867,CVE-2023-20593,CVE-2023-20569,CVE-2023-2019,CVE-2023-2008,CVE-2023-2002,CVE-2023-1998,CVE-2023-1990,CVE-2023-1989,CVE-2023-1981,CVE-2023-1872,CVE-2023-1855,CVE-2023-1838,CVE-2023-1829,CVE-2023-1670,CVE-2023-1652,CVE-2023-1637,CVE-2023-1611,CVE-2023-1582,CVE-2023-1513,CVE-2023-1410,CVE-2023-1390,CVE-2023-1387,CVE-2023-1382,CVE-2023-1380,CVE-2023-1355,CVE-2023-1281,CVE-2023-1264,CVE-2023-1255,CVE-2023-1249,CVE-2023-1195,CVE-2023-1175,CVE-2023-1170,CVE-2023-1127,CVE-2023-1118,CVE-2023-1095,CVE-2023-1079,CVE-2023-1078,CVE-2023-1077,CVE-2023-1076,CVE-2023-1075,CVE-2023-0922,CVE-2023-0687,CVE-2023-0597,CVE-2023-0590,CVE-2023-0512,CVE-2023-0466,CVE-2023-0465,CVE-2023-0464,CVE-2023-0461,CVE-2023-0459,CVE-2023-0394,CVE-2023-0386,CVE-2023-0361,CVE-2023-0286,CVE-2023-0215,CVE-2023-0045,CVE-2022-4904,CVE-2022-4899,CVE-2022-48303,CVE-2022-4744,CVE-2022-46908,CVE-2022-46146,CVE-2022-45919,CVE-2022-45887,CVE-2022-45886,CVE-2022-45885,CVE-2022-45884,CVE-2022-45143,CVE-2022-45061,CVE-2022-4450,CVE-2022-43945,CVE-2022-4304,CVE-2022-4269,CVE-2022-41862,CVE-2022-41715,CVE-2022-40982,CVE-2022-40735,CVE-2022-38096,CVE-2022-38087,CVE-2022-37026,CVE-2022-36280,CVE-2022-36109,CVE-2022-36062,CVE-2022-35957,CVE-2022-3566,CVE-2022-3555,CVE-2022-3523,CVE-2022-33894,CVE-2022-32149,CVE-2022-3171,CVE-2022-31107,CVE-2022-31097,CVE-2022-29824,CVE-2022-28737,CVE-2022-27664,CVE-2022-23471,CVE-2022-2196,CVE-2022-1941,CVE-2022-0185,CVE-2022-0155,CVE-2021-43138,CVE-2021-3923,CVE-2021-3918,CVE-2021-38578,CVE-2021-3807,CVE-2021-3541,CVE-2021-3246,CVE-2021-30560,CVE-2021-30465,CVE-2021-29650,CVE-2021-22570,CVE-2021-22569,CVE-2020-7753,CVE-2020-36694,CVE-2020-36691,CVE-2020-36242,CVE-2020-25659,CVE-2020-23903,CVE-2020-12762,CVE-2019-20916,CVE-2019-19921,CVE-2019-15133,CVE-2018-13139,CVE-2018-11490,CVE-2018-1000518,CVE-2017-5753,CVE-2016-3977,CVE-2016-20012,CVE-2007-4559 For more information,
see the SUSE Website
https://www.suse.com/security/cve/This hyperlink is taking you to a website outside of Dell Technologies.

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-32463 Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:LThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-32463 Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:LThis hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies anbefaler at alle kunder tar hensyn til både grunnpoengsummen og alle relevante, midlertidige og miljømessige resultater som kan påvirke den potensielle alvorlighetsgraden knyttet til bestemte sikkerhetsproblemer.

Berørte produkter og utbedring

Product Affected Versions Remediated Versions Link
Dell EMC VxRail Appliance 7.0.x versions prior to 7.0.480 Version 7.0.480 VxRail 7.0.480
Product Affected Versions Remediated Versions Link
Dell EMC VxRail Appliance 7.0.x versions prior to 7.0.480 Version 7.0.480 VxRail 7.0.480

Endringshistorikk

RevisionDateDescription
1.02023-10-12Initial Release
2.02023-10-13Updated for enhanced presentation with no changes to content.
3.02023-10-27Amended to add CVE remediated in VMSA-2023-0023
4.02023-11-22Amended for Intel firmware and AMD vulnerabilities

Relatert informasjon

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide


Artikkelegenskaper


Berørt produkt
VxRail, CloudArray Virtual Edition for VxRail Appliance, Product Security Information, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series , VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560, VxRail E560 VCF, VxRail E560F, VxRail E560F VCF, VxRail E560N, VxRail E560N VCF, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560 VCF, VxRail G560F, VxRail G560F VCF, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570 VCF, VxRail P570F, VxRail P570F VCF, VxRail P580N, VxRail P580N VCF, VXRAIL P670F, VxRail P670N, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S570 VCF, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570 VCF, VxRail V570F, VxRail V570F VCF, VXRAIL V670F, VxRail VD-4000R, VxRail VD-4000W, VxRail VD-4000Z, VxRail VD-4510C, VxRail VD-4520C, VxRail VD Series Nodes, VxRail VE-660, VxRail VP-760 ...
Dato for siste publisering

08 jan. 2024

Versjon

8

Artikkeltype

Dell Security Advisory