Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

DSA-2021-091: Dell EMC XtremIO Security Update for Multiple Vulnerabilities

Summary: Dell EMC XtremIO remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

This article applies to   This article does not apply to 

Impact

High

Details

Proprietary Code CVE(s) 

Description 

CVSSBase Score 

CVSS Vector String  

CVE-2021-21549 

Dell EMC XtremIO Versions prior to 6.3.3-8, contain a Cross-Site Request Forgery Vulnerability in XMS. A non-privileged attacker could potentially exploit this vulnerability, leading to a privileged victim application user being tricked into sending state-changing requests to the vulnerable application, causing unintended server operations. 

8.8 

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

 

Third-Party Component  

 

CVE(s) 

More information 

OpenSSL 

CVE-2020-1971 

See NVD (http://nvd.nist.gov/) for individual scores for each CVE 

Proprietary Code CVE(s) 

Description 

CVSSBase Score 

CVSS Vector String  

CVE-2021-21549 

Dell EMC XtremIO Versions prior to 6.3.3-8, contain a Cross-Site Request Forgery Vulnerability in XMS. A non-privileged attacker could potentially exploit this vulnerability, leading to a privileged victim application user being tricked into sending state-changing requests to the vulnerable application, causing unintended server operations. 

8.8 

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

 

Third-Party Component  

 

CVE(s) 

More information 

OpenSSL 

CVE-2020-1971 

See NVD (http://nvd.nist.gov/) for individual scores for each CVE 

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

CVE(s) Addressed 

Product 

Affected Version(s) 

Updated Version(s) 

Link to Update 

CVE-2020-1971 

XtremIO X1, XtremIO X2 

XMS versions prior to 6.3.3-8 

XMS 6.3.3-8 

Dell EMC recommends all customers upgrade at the earliest opportunity. Customers can contact Dell EMC support to perform the upgrade. 

CVE-2021-21549 

CVE(s) Addressed 

Product 

Affected Version(s) 

Updated Version(s) 

Link to Update 

CVE-2020-1971 

XtremIO X1, XtremIO X2 

XMS versions prior to 6.3.3-8 

XMS 6.3.3-8 

Dell EMC recommends all customers upgrade at the earliest opportunity. Customers can contact Dell EMC support to perform the upgrade. 

CVE-2021-21549 

Workarounds & Mitigations

None

Revision History

Revision 

Date 

Description 

1.0 

2021-05-13 

Initial Release 

Acknowledgements

CVE-2021-21549: Dell would like to thank Tomasz Stachowicz for reporting this issue.

Related Information

Affected Products

XtremIO, Product Security Information, XtremIO Family, XtremIO HW Gen2 400GB, XtremIO HW Gen2 400GB Encrypt Capbl, XtremIO HW Gen2 400GB Encrypt Disable, XtremIO HW Gen2 400GB Exp Encrypt Disable, XtremIO HW Gen2 400GB Expandable , XtremIO HW Gen2 800GB Encrypt Capbl ...

Products

XtremIO HW Gen2 800GB Encrypt Disable, XtremIO HW Gen3 40TB, XtremIO HW Gen3 40TB Encrypt Disable, XtremIO HW X2-R, XtremIO HW X2-R Encrypt Disable, XtremIO HW X2-S, XtremIO HW X2-S Encrypt Disable, XtremIO HW X2-T, XtremIO HW X2-T Encrypt Disable , XtremIO X1, XtremIO X2 ...
Article Properties
Article Number: 000186363
Article Type: Dell Security Advisory
Last Modified: 13 May 2021
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.
Article Properties
Article Number: 000186363
Article Type: Dell Security Advisory
Last Modified: 13 May 2021
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.