DSA-2022-216: Dell Enterprise Hybrid Cloud Security Update for Multiple Third-Party Component Vulnerabilities
Summary: Dell Enterprise Hybrid Cloud remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Bu makale şunlar için geçerlidir:
Bu makale şunlar için geçerli değildir:
Bu makale, belirli bir ürüne bağlı değildir.
Bu makalede tüm ürün sürümleri tanımlanmamıştır.
Impact
Critical
Details
| Third-party Component | CVE | More information |
| VMware vRealize Operations | CVE-2022-31672 | VMSA-2022-0022 |
| CVE-2022-31673 | ||
| CVE-2022-31674 | ||
| CVE-2022-31675 | ||
| VMware vRealize Automation | CVE-2022-31656 | VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-31657 | ||
| CVE-2022-31658 | ||
| CVE-2022-31659 | ||
| CVE-2022-31660 | ||
| CVE-2022-31661 | ||
| CVE-2022-31662 | ||
| CVE-2022-31663 | ||
| CVE-2022-31664 | ||
| CVE-2022-31665 | ||
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-29901 | VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-28693 | ||
| CVE-2022-23816 | ||
| CVE-2022-23825 | ||
| VMware vRealize Log Insight 8.x | CVE-2022-31654 | VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
| CVE-2022-31655 | ||
| VMware Server (6.5, 6.7, and 7.0) | CVE-2022-22982 | VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-21123 | VMSA-2022-0016, see KB articles for workarounds and fixes. |
| CVE-2022-21125 | ||
| CVE-2022-21166 |
See the security advisories that are listed in the table above for details on vulnerabilities and remediation.
Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
| Third-party Component | CVE | More information |
| VMware vRealize Operations | CVE-2022-31672 | VMSA-2022-0022 |
| CVE-2022-31673 | ||
| CVE-2022-31674 | ||
| CVE-2022-31675 | ||
| VMware vRealize Automation | CVE-2022-31656 | VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-31657 | ||
| CVE-2022-31658 | ||
| CVE-2022-31659 | ||
| CVE-2022-31660 | ||
| CVE-2022-31661 | ||
| CVE-2022-31662 | ||
| CVE-2022-31663 | ||
| CVE-2022-31664 | ||
| CVE-2022-31665 | ||
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-29901 | VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
| CVE-2022-28693 | ||
| CVE-2022-23816 | ||
| CVE-2022-23825 | ||
| VMware vRealize Log Insight 8.x | CVE-2022-31654 | VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
| CVE-2022-31655 | ||
| VMware Server (6.5, 6.7, and 7.0) | CVE-2022-22982 | VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
| VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-21123 | VMSA-2022-0016, see KB articles for workarounds and fixes. |
| CVE-2022-21125 | ||
| CVE-2022-21166 |
See the security advisories that are listed in the table above for details on vulnerabilities and remediation.
Dell Technologies recommends all customers upgrade at the earliest opportunity. See VxRail Simple Support Matrix or VxBlock Release Certification Matrix for compatibility with all EHC components.
Etkilenen Ürünler ve Düzeltme
| Product | Affected Versions | Updated Versions |
| Dell Enterprise Hybrid Cloud | Versions before 4.1.2 | 4.1.2 |
The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
- Dell Enterprise Hybrid Cloud version 4.1.2
Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
| Product | Affected Versions | Updated Versions |
| Dell Enterprise Hybrid Cloud | Versions before 4.1.2 | 4.1.2 |
The following Dell Enterprise Hybrid Cloud release contains a resolution to these vulnerabilities.
- Dell Enterprise Hybrid Cloud version 4.1.2
Follow the guidance in the security advisories for the individual components for remediation or hotfixes that are shown in the table above.
Always reference the ESSM documentation for your Dell Enterprise Hybrid Cloud system to ensure supported component compliance.
ESSM documentation updates are published regularly, fixed component versions that are listed in the advisories may not be in the current ESSM revision. In such cases, an RPQ is required to confirm correct feature support and operation of the component.
Revision History
| Revision | Date | Description |
| 1.0 | 2022-08-10 | Initial Release |
Related Information
Yasal Uyarı
Etkilenen Ürünler
Enterprise Hybrid Cloud, Enterprise Hybrid Cloud, Federation End User Computing Solution for Federation Enterprise Hybrid Cloud, Product Security InformationMakale Özellikleri
Article Number: 000202365
Article Type: Dell Security Advisory
Son Değiştirme: 19 Eyl 2025
Sorularınıza diğer Dell kullanıcılarından yanıtlar bulun
Destek Hizmetleri
Aygıtınızın Destek Hizmetleri kapsamında olup olmadığını kontrol edin.