DSA-2021-128: Dell PowerFlex Appliance Security Update for VMware vCenter Server Component Vulnerabilities

摘要: Dell PowerFlex Appliance remediation is available for VMware vCenter Server that may be exploited by malicious users to compromise the affected system.

本文适用于 本文不适用于 本文并非针对某种特定的产品。 本文并非包含所有产品版本。

影响

Critical

详情

Third-party Component
 
CVEs More information
VMware vCenter Server CVE-2021-21985 VMSA-2021-0010
CVE-2021-21986
Third-party Component
 
CVEs More information
VMware vCenter Server CVE-2021-21985 VMSA-2021-0010
CVE-2021-21986
Dell Technologies 建议所有客户考虑 CVSS 基本分数以及任何相关的时间和环境分数,这可能会影响与特定安全漏洞相关的潜在严重程度。

受影响的产品和补救措施

CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2021-21985
CVE-2021-21986
PowerFlex Appliance Versions before Intelligent_Catalog_37_361_00_r14, Versions before Intelligent_Catalog_37_355_00_r16 Intelligent_Catalog_37_361_00_r14, Intelligent_Catalog_37_355_00_r16 For IC downloads: https://www.dell.com/support/home/en-us/product-support/product/vxflex-appliance-sw/drivers
CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2021-21985
CVE-2021-21986
PowerFlex Appliance Versions before Intelligent_Catalog_37_361_00_r14, Versions before Intelligent_Catalog_37_355_00_r16 Intelligent_Catalog_37_361_00_r14, Intelligent_Catalog_37_355_00_r16 For IC downloads: https://www.dell.com/support/home/en-us/product-support/product/vxflex-appliance-sw/drivers

解决方法和缓解措施

PowerFlex Appliance includes the updated vCenter versions containing the remediation in an upcoming release update. In the meantime, the following workaround is recommended for PowerFlex Appliance customers.

VMware’s recommended workaround is to temporarily disable the “VMware vSAN H5 client plug-in” for vCenter Server.

The procedure to disable the plug-in is outlined in the VMware KB article: https://kb.vmware.com/s/article/83829

Note:

  • The workaround is expected to be a temporary mitigation until the updated release is available.
  • Changes in the workaround must be reverted after applying the vCenter update. Procedure to revert the changes is outlined in https://kb.vmware.com/s/article/83829.
  • vSAN continues to function as expected, and vSAN related alarms continue to trigger for any events in the environment. These features are not dependent on the vSAN H5 plug-in.
  • The vSAN sections in the Monitoring and Configuration tabs in the vCenter UI are unavailable, and thus you cannot change the existing vSAN configuration.
  • The Skyline/vSAN Health UI interface is unavailable but the underlying logic monitoring the environment is still functional.
  • If there is a critical issue with vSAN, then the plug-in may need to be temporarily enabled to assist with troubleshooting and quicker resolution. When the issue is addressed, the plug-in can be disabled again. In this scenario, vCenter is exposed to the vulnerability as described in VMSA-2021-0010 while the plug-in is enabled.
Other references from VMware on this issue:
https://blogs.vmware.com/vsphere/2021/05/vmsa-2021-0010.html

修订历史记录

RevisionDateDescription
1.02021-06-14Initial release - Workarounds and Mitigations
2.02021-07-13Updated Affected Products and Remediation section to add Affected versions, Updated versions, and Link to Update information.  

相关信息

受影响的产品

PowerFlex Appliance, Product Security Information, PowerFlex appliance R640, PowerFlex appliance R740XD, PowerFlex appliance R840
文章属性
文章编号: 000188318
文章类型: Dell Security Advisory
上次修改时间: 18 9月 2025
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。