DSA-2021-260: Dell PowerPath Management Appliance Security Update for a Hard Coded Encryption Key Vulnerability
摘要: Dell PowerPath Management Appliance remediation is available for a hard coded encryption key vulnerability that may be exploited by malicious users to compromise the affected system.
本文章適用於
本文章不適用於
本文無關於任何特定產品。
本文未識別所有產品版本。
影響
High
詳細資料
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2021-43587 | Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges. | 8.2 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2021-43587 | Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges. | 8.2 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
受影響的產品與補救措施
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell PowerPath Management Appliance | 2.6 | 3.2 P01 | https://www.dell.com/support/home/en-in/product-support/product/powerpath-management-appliance/drivers |
| 3.0 | |||
| 3.0 P01 | |||
| 3.1 | |||
| 3.2 |
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell PowerPath Management Appliance | 2.6 | 3.2 P01 | https://www.dell.com/support/home/en-in/product-support/product/powerpath-management-appliance/drivers |
| 3.0 | |||
| 3.0 P01 | |||
| 3.1 | |||
| 3.2 |
修訂歷史記錄
| Revision | Date | Description |
| 1.0 | 2021-12-09 | Initial Release |
相關資訊
法律免責聲明
受影響的產品
Product Security Information文章屬性
文章編號: 000194083
文章類型: Dell Security Advisory
上次修改時間: 18 9月 2025
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。