DSA-2022-265: Dell iDRAC8 and Dell iDRAC9 Security Update for a RACADM Vulnerability

摘要: Dell iDRAC8 and Dell iDRAC9 remediation are available for an input validation vulnerability that may be exploited by high privileged malicious users to bypass the firmware lock-down and perform a firmware update. ...

本文章適用於 本文章不適用於 本文無關於任何特定產品。 本文未識別所有產品版本。

影響

Low

詳細資料

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-34435 Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-34436 Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update.
 
2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-34435 Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update. 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-34436 Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker may potentially exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update.
 
2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies 建議所有客戶不僅要參考 CVSS 基本分數,也要將可能會影響與特定安全漏洞相關之潛在嚴重性的所有相關暫時和環境分數納入考量。

受影響的產品與補救措施

CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-34435 Dell iDRAC9 Versions before 6.00.30.00 6.00.30.00 https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF
CVE-2022-34436 Dell iDRAC8 Versions before 2.84.84.84 2.84.84.84 https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW 
CVEs Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-34435 Dell iDRAC9 Versions before 6.00.30.00 6.00.30.00 https://www.dell.com/support/home/drivers/driversdetails?driverId=D92HF
CVE-2022-34436 Dell iDRAC8 Versions before 2.84.84.84 2.84.84.84 https://www.dell.com/support/home/drivers/driversdetails?driverId=G79DW 

修訂歷史記錄

RevisionDateDescription
1.02022-11-14Initial release
2.02023-04-03Updated "Affected Products and Remediation" section with iDRAC8 Updated Version
3.02023-08-11Tagged Azure Stack Hub

感謝

Dell Technologies would like to thank the Cloud Compute Security Team from Google for reporting this issue.
 

相關資訊

受影響的產品

iDRAC8, iDRAC9, Integrated System for Microsoft Azure Stack Hub, Integrated System for Microsoft Azure Stack Hub 13G, Integrated System for Microsoft Azure Stack Hub 14G, iDRAC9 - 3.0x Series, iDRAC9 - 3.1x Series, iDRAC9 - 3.2x Series , iDRAC9 - 3.3x Series, iDRAC9 - 3.4x Series, iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series, iDRAC9 - 6.xx Series, Product Security Information ...
文章屬性
文章編號: 000205346
文章類型: Dell Security Advisory
上次修改時間: 11 8月 2023
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。