Ana içeriğe atla
  • Hızla ve kolayca sipariş verin
  • Siparişleri görüntüleyin ve kargonuzun durumunu izleyin
  • Ürünlerinizin listesini oluşturun ve listeye erişin
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Article Number: 000201667


DSA-2022-156: Dell SmartFabric Storage Software Security Update for Multiple Component Vulnerabilities

Summary: Dell SmartFabric Storage Software remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Article Content


Impact

High

Details

Proprietary Code CVE Description CVSS Base Score CVSS Vector String
CVE-2022-31232 SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Proprietary Code CVE Description CVSS Base Score CVSS Vector String
CVE-2022-31232 SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

CVEs Addressed Product Affected Version Updated Version Link to Update
CVE-2022-31232 SmartFabric Storage Software 1.0.0 1.1.0 https://www.dell.com/support/home/en-us/product-support/product/dell-emc-smartfabric-storage-software-trial/drivers
CVEs Addressed Product Affected Version Updated Version Link to Update
CVE-2022-31232 SmartFabric Storage Software 1.0.0 1.1.0 https://www.dell.com/support/home/en-us/product-support/product/dell-emc-smartfabric-storage-software-trial/drivers

Workarounds and Mitigations

If RADIUS and TACACS authentication is not a requirement, then customers can execute the “rm /etc/ham/libnss_sac.enable” command to mitigate the vulnerability. If RADIUS and TACACS is a requirement, then customers must update.

Revision History

RevisionDateDescription
1.02022-07-19Initial Release

Related Information

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide


Article Properties


Affected Product

SmartFabric OS10 Software

Product

Product Security Information

Last Published Date

19 Tem 2022

Version

1

Article Type

Dell Security Advisory