DSA-2021-203: Dell EMC Integrated Data Protection Appliance Security Update for Multiple Third-Party Component Vulnerabilities
Sammanfattning: Dell EMC Integrated Data Protection Appliance remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Den här artikeln gäller för
Den här artikeln gäller inte för
Den här artikeln är inte kopplad till någon specifik produkt.
Alla produktversioner identifieras inte i den här artikeln.
Påverkan
Critical
Information
| Third-party Component |
CVEs | More information |
| vSphere 6.7 | CVE-2021-21991 |
https://www.vmware.com/security/advisories/VMSA-2021-0020.html https://www.vmware.com/security/advisories/VMSA-2021-0002 https://www.vmware.com/security/advisories/VMSA-2021-0010.html https://www.vmware.com/security/advisories/VMSA-2021-0014.html https://www.vmware.com/security/advisories/VMSA-2020-0029.html |
| CVE-2021-21992 | ||
| CVE-2021-21993 | ||
| CVE-2021-22005 | ||
| CVE-2021-22006 | ||
| CVE-2021-22007 | ||
| CVE-2021-22008 | ||
| CVE-2021-22009 | ||
| CVE-2021-22010 | ||
| CVE-2021-22011 | ||
| CVE-2021-22012 | ||
| CVE-2021-22013 | ||
| CVE-2021-22014 | ||
| CVE-2021-22015 | ||
| CVE-2021-22016 | ||
| CVE-2021-22017 | ||
| CVE-2021-22018 | ||
| CVE-2021-22019 | ||
| CVE-2021-22020 | ||
| CVE-2021-21974 | ||
| CVE-2021-21985 | ||
| CVE-2021-21986 | ||
CVE-2021-21994 |
||
| CVE-2021-21995 | ||
| CVE-2020-3999 | ||
| iDRAC9 | CVE-2021-21538 |
https://www.dell.com/support/manuals/en-us/idrac9-lifecycle-controller-v4.x-series/idrac9_4.40.10.00_rn/release-summary |
| CVE-2021-21539 |
||
| CVE-2021-21540 | ||
| CVE-2021-21541 | ||
| CVE-2021-21542 | ||
| CVE-2021-21543 | ||
| CVE-2021-21544 | ||
| iDRAC8 | CVE-2021-21510 | https://www.dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability |
| Appliance Configuration Manager | CVE-2020-25632 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. https://www.suse.com/support/kb/doc/?id=000019892 https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2021.html |
| CVE-2020-25647 | ||
| CVE-2020-27749 | ||
| CVE-2020-27779 | ||
| CVE-2020-14372 | ||
| CVE-2021-20225 | ||
| CVE-2021-20233 | ||
| CVE-2020-14803 | ||
| CVE-2021-2388 | ||
| CVE-2021-2369 | ||
| CVE-2021-2432 | ||
| CVE-2021-2341 | ||
| CVE-2021-2161 | ||
| CVE-2021-2163 | ||
| Intel® SGX and Intel® TXT | CVE-2020-8764 | INTEL-SA-00390 INTEL-SA-00358 INTEL-SA-00391 INTEL-SA-00381 |
| CVE-2020-8738 | ||
| CVE-2020-8740 | ||
| CVE-2020-8739 | ||
| CVE-2020-8674 | ||
| CVE-2020-8738 | ||
| CVE-2020-8740 | ||
| CVE-2020-8739 | ||
| CVE-2020-0587 | ||
| CVE-2020-0588 | ||
| CVE-2020-0590 | ||
| CVE-2020-0591 | ||
| CVE-2020-0592 | ||
| CVE-2020-0593 | ||
| CVE-2020-8705 | ||
| CVE-2020-8755 | ||
| CVE-2020-8696 |
| Third-party Component |
CVEs | More information |
| vSphere 6.7 | CVE-2021-21991 |
https://www.vmware.com/security/advisories/VMSA-2021-0020.html https://www.vmware.com/security/advisories/VMSA-2021-0002 https://www.vmware.com/security/advisories/VMSA-2021-0010.html https://www.vmware.com/security/advisories/VMSA-2021-0014.html https://www.vmware.com/security/advisories/VMSA-2020-0029.html |
| CVE-2021-21992 | ||
| CVE-2021-21993 | ||
| CVE-2021-22005 | ||
| CVE-2021-22006 | ||
| CVE-2021-22007 | ||
| CVE-2021-22008 | ||
| CVE-2021-22009 | ||
| CVE-2021-22010 | ||
| CVE-2021-22011 | ||
| CVE-2021-22012 | ||
| CVE-2021-22013 | ||
| CVE-2021-22014 | ||
| CVE-2021-22015 | ||
| CVE-2021-22016 | ||
| CVE-2021-22017 | ||
| CVE-2021-22018 | ||
| CVE-2021-22019 | ||
| CVE-2021-22020 | ||
| CVE-2021-21974 | ||
| CVE-2021-21985 | ||
| CVE-2021-21986 | ||
CVE-2021-21994 |
||
| CVE-2021-21995 | ||
| CVE-2020-3999 | ||
| iDRAC9 | CVE-2021-21538 |
https://www.dell.com/support/manuals/en-us/idrac9-lifecycle-controller-v4.x-series/idrac9_4.40.10.00_rn/release-summary |
| CVE-2021-21539 |
||
| CVE-2021-21540 | ||
| CVE-2021-21541 | ||
| CVE-2021-21542 | ||
| CVE-2021-21543 | ||
| CVE-2021-21544 | ||
| iDRAC8 | CVE-2021-21510 | https://www.dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability |
| Appliance Configuration Manager | CVE-2020-25632 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. https://www.suse.com/support/kb/doc/?id=000019892 https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2021.html |
| CVE-2020-25647 | ||
| CVE-2020-27749 | ||
| CVE-2020-27779 | ||
| CVE-2020-14372 | ||
| CVE-2021-20225 | ||
| CVE-2021-20233 | ||
| CVE-2020-14803 | ||
| CVE-2021-2388 | ||
| CVE-2021-2369 | ||
| CVE-2021-2432 | ||
| CVE-2021-2341 | ||
| CVE-2021-2161 | ||
| CVE-2021-2163 | ||
| Intel® SGX and Intel® TXT | CVE-2020-8764 | INTEL-SA-00390 INTEL-SA-00358 INTEL-SA-00391 INTEL-SA-00381 |
| CVE-2020-8738 | ||
| CVE-2020-8740 | ||
| CVE-2020-8739 | ||
| CVE-2020-8674 | ||
| CVE-2020-8738 | ||
| CVE-2020-8740 | ||
| CVE-2020-8739 | ||
| CVE-2020-0587 | ||
| CVE-2020-0588 | ||
| CVE-2020-0590 | ||
| CVE-2020-0591 | ||
| CVE-2020-0592 | ||
| CVE-2020-0593 | ||
| CVE-2020-8705 | ||
| CVE-2020-8755 | ||
| CVE-2020-8696 |
Berörda produkter och åtgärder
| Product | Affected Versions | Updated Versions | Link to Update | |
| Dell EMC Integrated Data Protection Appliance | Versions before 2.7 | 2.7 | Link to 2.7 upgrade binary | |
| Product | Affected Versions | Updated Versions | Link to Update | |
| Dell EMC Integrated Data Protection Appliance | Versions before 2.7 | 2.7 | Link to 2.7 upgrade binary | |
Relaterad information
Juridisk friskrivning
Berörda produkter
Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software, Product Security InformationArtikelegenskaper
Artikelnummer: 000192191
Artikeltyp: Dell Security Advisory
Senast ändrad: 19 sep. 2025
Få svar på dina frågor från andra Dell-användare
Supporttjänster
Kontrollera om din enhet omfattas av supporttjänster.