DSA-2022-265: Dell iDRAC8 and Dell iDRAC9 Security Update for a RACADM Vulnerability
Summary: Dell iDRAC8 and Dell iDRAC9 remediation are available for an input validation vulnerability that may be exploited by high privileged malicious users to bypass the firmware lock-down and perform a firmware update. ...
Bu makale şunlar için geçerlidir:
Bu makale şunlar için geçerli değildir:
Bu makale, belirli bir ürüne bağlı değildir.
Bu makalede tüm ürün sürümleri tanımlanmamıştır.
Impact
Low
Details
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34435 | Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
| CVE-2022-34436 | Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. |
2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N |
Etkilenen Ürünler ve Düzeltme
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
| CVEs Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-34435 | Dell iDRAC9 | Versions before 6.00.30.00 | 6.00.30.00 | https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF |
| CVE-2022-34436 | Dell iDRAC8 | Versions before 2.84.84.84 | 2.84.84.84 | https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW |
Revision History
| Revision | Date | Description |
| 1.0 | 2022-11-14 | Initial release |
| 2.0 | 2023-04-03 | Updated "Affected Products and Remediation" section with iDRAC8 Updated Version |
| 3.0 | 2023-08-11 | Tagged Azure Stack Hub |
Acknowledgements
Dell Technologies would like to thank the Cloud Compute Security Team from Google for reporting this issue.
Related Information
Yasal Uyarı
Etkilenen Ürünler
iDRAC8, iDRAC9, Integrated System for Microsoft Azure Stack Hub, Integrated System for Microsoft Azure Stack Hub 13G, Integrated System for Microsoft Azure Stack Hub 14G, iDRAC9 - 3.0x Series, iDRAC9 - 3.1x Series, iDRAC9 - 3.2x Series
, iDRAC9 - 3.3x Series, iDRAC9 - 3.4x Series, iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series, iDRAC9 - 6.xx Series, Product Security Information
...
Makale Özellikleri
Article Number: 000205346
Article Type: Dell Security Advisory
Son Değiştirme: 11 Ağu 2023
Sorularınıza diğer Dell kullanıcılarından yanıtlar bulun
Destek Hizmetleri
Aygıtınızın Destek Hizmetleri kapsamında olup olmadığını kontrol edin.