Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

DSA-2022-073: Dell Unisphere for PowerMax, Dell Unisphere for PowerMax vApp, Dell Solutions Enabler vApp, Dell Unisphere 360, Dell VASA Provider vApp, and Dell PowerMax Embedded Management Security Update for Multiple Vulnerabilities

Summary: Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, Dell Unisphere 360, Dell VASA Provider Virtual Appliance, and Dell PowerMax Embedded Management remediation is available for multiple security vulnerabilities that may potentially be exploited by malicious users to compromise the affected system. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

High

Details

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-36339 The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts.  A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance.

Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226.

Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity.
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


 
Third-party Component CVEs More information
SUSE Linux Enterprise Server 12 SP5 See SUSE Security Advisories. See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories.

SUSE-SU-2022:0030-1,
SUSE-SU-2022:0189-1:
CVE-2021-4034 polkit fixes,
SUSE-SU-2021:4060-1,
SUSE-SU-2021:4004-1,
SUSE-SU-2021:3951-1,
SUSE-SU-2021:3935-1,
SUSE-SU-2021:3878-1,
SUSE-SU-2021:3877-1,
SUSE-SU-2021:3875-1,
SUSE-SU-2021:3859-1,
SUSE-SU-2021:3853-1,
SUSE-SU-2021:3837-1,
SUSE-SU-2021:3748-1,
SUSE-SU-2021:3657-1,
SUSE-SU-2021:3652-1,
SUSE-SU-2021:3611-1,
SUSE-SU-2021:3524-1,
SUSE-SU-2021:3502-1,
SUSE-SU-2021:3491-1,
SUSE-SU-2021:3486-1,
SUSE-SU-2021:3477-1,
SUSE-SU-2021:3475-1,
SUSE-SU-2021:3463-1,
SUSE-SU-2021:3452-1,
SUSE-SU-2021:3237-1,
SUSE-SU-2021:3144-1,
SUSE-SU-2021:2930-1,
SUSE-SU-2021:2876-1,
SUSE-SU-2021:2825-1,
SUSE-SU-2021:2423-1,
SUSE-SU-2021:1621-1,
SUSE-SU-2021:0886-1,
SUSE-SU-2021:0794-1,
SUSE-SU-2021:0432-1,
SUSE-SU-2021:0344-1,
SUSE-SU-2020:3765-1,
SUSE-SU-2020:3596-1,
SUSE-SU-2020:3262-1,
SUSE-SU-2020:3121-1,
SUSE-SU-2020:2699-1,
SUSE-SU-2020:2275-1,
SUSE-SU-2020:1839-1,
SUSE-SU-2020:1732-1,
SUSE-SU-2020:1662-1,
SUSE-SU-2020:1612-1,
SUSE-SU-2020:1570-1,
SUSE-SU-2020:1550-1,
SUSE-SU-2020:1534-1,
SUSE-SU-2020:1524-1,
SUSE-SU-2020:1180-1,
SUSE-SU-2020:0854-1,
SUSE-SU-2020:0630-1,
SUSE-SU-2020:0545-1,
SUSE-SU-2020:0497-1,
SUSE-SU-2020:0457-1,
SUSE-SU-2020:0410-1,
SUSE-SU-2020:0331-1,
SUSE-SU-2020:0088-1,
SUSE-SU-2019:3180-1,
SUSE-SU-2019:3060-2,
SUSE-SU-2019:2972-1,
SUSE-SU-2019:2941-1,
SUSE-SU-2019:2936-1,
SUSE-SU-2019:2798-1,
SUSE-SU-2019:2781-1,
SUSE-SU-2019:2669-1,
SUSE-SU-2019:2339-2,
SUSE-SU-2019:2265-1,
SUSE-SU-2019:2264-1,
SUSE-SU-2019:2013-1,
SUSE-SU-2019:1972-1,
SUSE-SU-2019:1955-1,
SUSE-SU-2019:1733-1,
SUSE-SU-2019:1645-1,
SUSE-SU-2019:1606-2,
SUSE-SU-2019:1606-1,
SUSE-SU-2019:1468-1,
SUSE-SU-2019:1456-1,
SUSE-SU-2019:1379-1,
SUSE-SU-2019:1363-1,
SUSE-SU-2019:1265-1,
SUSE-SU-2019:1166-1,
SUSE-SU-2019:1111-1,
SUSE-SU-2019:1091-1,
SUSE-SU-2019:1060-1,
SUSE-SU-2019:0996-1,
SUSE-SU-2019:0956-1,
SUSE-SU-2019:0839-1,
SUSE-SU-2019:0838-1,
SUSE-SU-2019:0776-1,
SUSE-SU-2019:0747-1,
SUSE-SU-2019:0655-1,
SUSE-SU-2019:0450-1,
SUSE-SU-2019:0428-1,
SUSE-SU-2019:0249-1,
SUSE-SU-2019:0209-1,
SUSE-SU-2019:0135-1,
SUSE-SU-2018:4191-1,
SUSE-SU-2018:4149-1,
SUSE-SU-2018:3967-1,
SUSE-SU-2018:3926-1,
SUSE-SU-2018:3911-1,
SUSE-SU-2018:3884-1,
SUSE-SU-2018:3767-1,
SUSE-SU-2018:3640-1,
SUSE-SU-2018:3608-1,
SUSE-SU-2018:3545-1,
SUSE-SU-2018:3447-1,
SUSE-SU-2018:3289-1,
SUSE-SU-2018:3286-1,
SUSE-SU-2018:3219-1,
SUSE-SU-2018:3066-1,
SUSE-SU-2018:2991-1,
SUSE-SU-2018:2978-1,
SUSE-SU-2018:2842-1,
SUSE-SU-2018:2841-1,
SUSE-SU-2018:2837-1,
SUSE-SU-2018:2836-1,
SUSE-SU-2018:2835-1,
SUSE-SU-2018:2814-1,
SUSE-SU-2018:2779-1,
SUSE-SU-2018:2715-1,
SUSE-SU-2018:2451-2,
SUSE-SU-2018:2204-1,
SUSE-SU-2018:2171-1,
SUSE-SU-2018:2145-1,
SUSE-SU-2018:2071-1,
SUSE-SU-2018:2038-1,
SUSE-SU-2018:1997-1,
SUSE-SU-2018:1972-1,
SUSE-SU-2018:1950-1,
SUSE-SU-2018:1836-1,
SUSE-SU-2018:1826-1,
SUSE-SU-2018:1698-1,
SUSE-SU-2018:1401-1,
SUSE-SU-2018:1398-1,
SUSE-SU-2018:1373-1,
SUSE-SU-2018:1327-1,
SUSE-SU-2018:1288-1,
SUSE-SU-2018:1195-1,
SUSE-SU-2018:1180-1,
SUSE-SU-2018:1074-1,
SUSE-SU-2018:0926-1,
SUSE-SU-2018:0878-1,
SUSE-SU-2018:0858-1,
SUSE-SU-2018:0769-1,
SUSE-SU-2018:0673-1,
SUSE-SU-2018:0662-1,
SUSE-SU-2018:0650-1,
SUSE-SU-2018:0546-1,
SUSE-SU-2018:0510-1,
SUSE-SU-2018:0373-1,
SUSE-SU-2018:0337-1,
SUSE-SU-2018:0299-1,
SUSE-SU-2018:0295-1,
SUSE-SU-2018:0284-1,
SUSE-SU-2018:0260-1,
SUSE-SU-2018:0217-1,
SUSE-SU-2018:0200-1,
SUSE-SU-2018:0193-1,
SUSE-SU-2018:0181-1,
SUSE-SU-2018:0173-1,
SUSE-SU-2018:0135-1,
SUSE-SU-2018:0123-1,
SUSE-SU-2018:0122-1,
SUSE-SU-2018:0120-1,
SUSE-SU-2018:0073-1,
SUSE-SU-2017:3441-1,
SUSE-SU-2017:3214-1,
SUSE-SU-2017:3092-1,
SUSE-SU-2017:3048-1,
SUSE-SU-2017:2947-1,
SUSE-SU-2017:2871-2,
SUSE-SU-2017:2854-1,
SUSE-SU-2017:2831-1,
SUSE-SU-2017:2569-1,
SUSE-SU-2017:2381-1,
SUSE-SU-2017:2344-1,
SUSE-SU-2017:2318-1,
SUSE-SU-2017:2299-1,
SUSE-SU-2017:2264-1,
SUSE-SU-2017:2174-1,
SUSE-SU-2017:2129-1,
SUSE-SU-2017:2117-1,
SUSE-SU-2017:2075-1,
SUSE-SU-2017:2031-1
Oracle CVE-2021-22959,
CVE-2022-21349,
CVE-2022-21291,
CVE-2022-21305,
CVE-2022-21277,
CVE-2022-21360,
CVE-2022-21365,
CVE-2022-21366,
CVE-2022-21282,
CVE-2022-21296,
CVE-2022-21299,
CVE-2022-21271,
CVE-2022-21283,
CVE-2022-21293,
CVE-2022-21294,
CVE-2022-21340,
CVE-2022-21341,
CVE-2022-21248
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Windows 10 CVE-2021-22947,
CVE-2021-36957,
CVE-2021-36976,
CVE-2021-38631,
CVE-2021-38665,
CVE-2021-38666,
CVE-2021-41333,
CVE-2021-41356,
CVE-2021-41366,
CVE-2021-41367,
CVE-2021-41370,
CVE-2021-41371,
CVE-2021-41377,
CVE-2021-41378,
CVE-2021-41379,
CVE-2021-42275,
CVE-2021-42276,
CVE-2021-42277,
CVE-2021-42279,
CVE-2021-42280,
CVE-2021-42283,
CVE-2021-42285,
CVE-2021-42288,
CVE-2021-43207,
CVE-2021-43215,
CVE-2021-43216,
CVE-2021-43217,
CVE-2021-43219,
CVE-2021-43222,
CVE-2021-43223,
CVE-2021-43224, 
CVE-2021-43226,
CVE-2021-43227,
CVE-2021-43228,
CVE-2021-43229, 
CVE-2021-43230,
CVE-2021-43231,
CVE-2021-43232,
CVE-2021-43233,
CVE-2021-43234,
CVE-2021-43235,
CVE-2021-43236,
CVE-2021-43238,
CVE-2021-43244,
CVE-2021-43247,
CVE-2021-43248,
CVE-2021-43883,
CVE-2021-43893,
CVE-2022-21833,
CVE-2022-21834, 
CVE-2022-21835,
CVE-2022-21836,
CVE-2022-21838,
CVE-2022-21839,
CVE-2022-21843,
CVE-2022-21848,
CVE-2022-21849,
CVE-2022-21850,
CVE-2022-21851,
CVE-2022-21852,
CVE-2022-21857,
CVE-2022-21858,
CVE-2022-21859,
CVE-2022-21860,
CVE-2022-21861,
CVE-2022-21862,
CVE-2022-21863,
CVE-2022-21864,
CVE-2022-21865,
CVE-2022-21866,
CVE-2022-21867,
CVE-2022-21868,
CVE-2022-21869,
CVE-2022-21870,
CVE-2022-21871,
CVE-2022-21872,
CVE-2022-21873,
CVE-2022-21874,
CVE-2022-21875,
CVE-2022-21876,
CVE-2022-21877,
CVE-2022-21878,
CVE-2022-21879,
CVE-2022-21880,
CVE-2022-21881,
CVE-2022-21882,
CVE-2022-21883,
CVE-2022-21885,
CVE-2022-21888,
CVE-2022-21889,
CVE-2022-21890,
CVE-2022-21892,
CVE-2022-21893,
CVE-2022-21894,
CVE-2022-21895,
CVE-2022-21896,
CVE-2022-21897,
CVE-2022-21898,
CVE-2022-21902,
CVE-2022-21903,
CVE-2022-21904,
CVE-2022-21906,
CVE-2022-21907,
CVE-2022-21908,
CVE-2022-21912,
CVE-2022-21913,
CVE-2022-21914,
CVE-2022-21915,
CVE-2022-21916,
CVE-2022-21918,
CVE-2022-21919,
CVE-2022-21920,
CVE-2022-21922,
CVE-2022-21924,
CVE-2022-21928,
CVE-2022-21958,
CVE-2022-21959,
CVE-2022-21960,
CVE-2022-21961,
CVE-2022-21962,
CVE-2022-21963
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-36339 The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts.  A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance.

Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226.

Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity.
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


 
Third-party Component CVEs More information
SUSE Linux Enterprise Server 12 SP5 See SUSE Security Advisories. See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories.

SUSE-SU-2022:0030-1,
SUSE-SU-2022:0189-1:
CVE-2021-4034 polkit fixes,
SUSE-SU-2021:4060-1,
SUSE-SU-2021:4004-1,
SUSE-SU-2021:3951-1,
SUSE-SU-2021:3935-1,
SUSE-SU-2021:3878-1,
SUSE-SU-2021:3877-1,
SUSE-SU-2021:3875-1,
SUSE-SU-2021:3859-1,
SUSE-SU-2021:3853-1,
SUSE-SU-2021:3837-1,
SUSE-SU-2021:3748-1,
SUSE-SU-2021:3657-1,
SUSE-SU-2021:3652-1,
SUSE-SU-2021:3611-1,
SUSE-SU-2021:3524-1,
SUSE-SU-2021:3502-1,
SUSE-SU-2021:3491-1,
SUSE-SU-2021:3486-1,
SUSE-SU-2021:3477-1,
SUSE-SU-2021:3475-1,
SUSE-SU-2021:3463-1,
SUSE-SU-2021:3452-1,
SUSE-SU-2021:3237-1,
SUSE-SU-2021:3144-1,
SUSE-SU-2021:2930-1,
SUSE-SU-2021:2876-1,
SUSE-SU-2021:2825-1,
SUSE-SU-2021:2423-1,
SUSE-SU-2021:1621-1,
SUSE-SU-2021:0886-1,
SUSE-SU-2021:0794-1,
SUSE-SU-2021:0432-1,
SUSE-SU-2021:0344-1,
SUSE-SU-2020:3765-1,
SUSE-SU-2020:3596-1,
SUSE-SU-2020:3262-1,
SUSE-SU-2020:3121-1,
SUSE-SU-2020:2699-1,
SUSE-SU-2020:2275-1,
SUSE-SU-2020:1839-1,
SUSE-SU-2020:1732-1,
SUSE-SU-2020:1662-1,
SUSE-SU-2020:1612-1,
SUSE-SU-2020:1570-1,
SUSE-SU-2020:1550-1,
SUSE-SU-2020:1534-1,
SUSE-SU-2020:1524-1,
SUSE-SU-2020:1180-1,
SUSE-SU-2020:0854-1,
SUSE-SU-2020:0630-1,
SUSE-SU-2020:0545-1,
SUSE-SU-2020:0497-1,
SUSE-SU-2020:0457-1,
SUSE-SU-2020:0410-1,
SUSE-SU-2020:0331-1,
SUSE-SU-2020:0088-1,
SUSE-SU-2019:3180-1,
SUSE-SU-2019:3060-2,
SUSE-SU-2019:2972-1,
SUSE-SU-2019:2941-1,
SUSE-SU-2019:2936-1,
SUSE-SU-2019:2798-1,
SUSE-SU-2019:2781-1,
SUSE-SU-2019:2669-1,
SUSE-SU-2019:2339-2,
SUSE-SU-2019:2265-1,
SUSE-SU-2019:2264-1,
SUSE-SU-2019:2013-1,
SUSE-SU-2019:1972-1,
SUSE-SU-2019:1955-1,
SUSE-SU-2019:1733-1,
SUSE-SU-2019:1645-1,
SUSE-SU-2019:1606-2,
SUSE-SU-2019:1606-1,
SUSE-SU-2019:1468-1,
SUSE-SU-2019:1456-1,
SUSE-SU-2019:1379-1,
SUSE-SU-2019:1363-1,
SUSE-SU-2019:1265-1,
SUSE-SU-2019:1166-1,
SUSE-SU-2019:1111-1,
SUSE-SU-2019:1091-1,
SUSE-SU-2019:1060-1,
SUSE-SU-2019:0996-1,
SUSE-SU-2019:0956-1,
SUSE-SU-2019:0839-1,
SUSE-SU-2019:0838-1,
SUSE-SU-2019:0776-1,
SUSE-SU-2019:0747-1,
SUSE-SU-2019:0655-1,
SUSE-SU-2019:0450-1,
SUSE-SU-2019:0428-1,
SUSE-SU-2019:0249-1,
SUSE-SU-2019:0209-1,
SUSE-SU-2019:0135-1,
SUSE-SU-2018:4191-1,
SUSE-SU-2018:4149-1,
SUSE-SU-2018:3967-1,
SUSE-SU-2018:3926-1,
SUSE-SU-2018:3911-1,
SUSE-SU-2018:3884-1,
SUSE-SU-2018:3767-1,
SUSE-SU-2018:3640-1,
SUSE-SU-2018:3608-1,
SUSE-SU-2018:3545-1,
SUSE-SU-2018:3447-1,
SUSE-SU-2018:3289-1,
SUSE-SU-2018:3286-1,
SUSE-SU-2018:3219-1,
SUSE-SU-2018:3066-1,
SUSE-SU-2018:2991-1,
SUSE-SU-2018:2978-1,
SUSE-SU-2018:2842-1,
SUSE-SU-2018:2841-1,
SUSE-SU-2018:2837-1,
SUSE-SU-2018:2836-1,
SUSE-SU-2018:2835-1,
SUSE-SU-2018:2814-1,
SUSE-SU-2018:2779-1,
SUSE-SU-2018:2715-1,
SUSE-SU-2018:2451-2,
SUSE-SU-2018:2204-1,
SUSE-SU-2018:2171-1,
SUSE-SU-2018:2145-1,
SUSE-SU-2018:2071-1,
SUSE-SU-2018:2038-1,
SUSE-SU-2018:1997-1,
SUSE-SU-2018:1972-1,
SUSE-SU-2018:1950-1,
SUSE-SU-2018:1836-1,
SUSE-SU-2018:1826-1,
SUSE-SU-2018:1698-1,
SUSE-SU-2018:1401-1,
SUSE-SU-2018:1398-1,
SUSE-SU-2018:1373-1,
SUSE-SU-2018:1327-1,
SUSE-SU-2018:1288-1,
SUSE-SU-2018:1195-1,
SUSE-SU-2018:1180-1,
SUSE-SU-2018:1074-1,
SUSE-SU-2018:0926-1,
SUSE-SU-2018:0878-1,
SUSE-SU-2018:0858-1,
SUSE-SU-2018:0769-1,
SUSE-SU-2018:0673-1,
SUSE-SU-2018:0662-1,
SUSE-SU-2018:0650-1,
SUSE-SU-2018:0546-1,
SUSE-SU-2018:0510-1,
SUSE-SU-2018:0373-1,
SUSE-SU-2018:0337-1,
SUSE-SU-2018:0299-1,
SUSE-SU-2018:0295-1,
SUSE-SU-2018:0284-1,
SUSE-SU-2018:0260-1,
SUSE-SU-2018:0217-1,
SUSE-SU-2018:0200-1,
SUSE-SU-2018:0193-1,
SUSE-SU-2018:0181-1,
SUSE-SU-2018:0173-1,
SUSE-SU-2018:0135-1,
SUSE-SU-2018:0123-1,
SUSE-SU-2018:0122-1,
SUSE-SU-2018:0120-1,
SUSE-SU-2018:0073-1,
SUSE-SU-2017:3441-1,
SUSE-SU-2017:3214-1,
SUSE-SU-2017:3092-1,
SUSE-SU-2017:3048-1,
SUSE-SU-2017:2947-1,
SUSE-SU-2017:2871-2,
SUSE-SU-2017:2854-1,
SUSE-SU-2017:2831-1,
SUSE-SU-2017:2569-1,
SUSE-SU-2017:2381-1,
SUSE-SU-2017:2344-1,
SUSE-SU-2017:2318-1,
SUSE-SU-2017:2299-1,
SUSE-SU-2017:2264-1,
SUSE-SU-2017:2174-1,
SUSE-SU-2017:2129-1,
SUSE-SU-2017:2117-1,
SUSE-SU-2017:2075-1,
SUSE-SU-2017:2031-1
Oracle CVE-2021-22959,
CVE-2022-21349,
CVE-2022-21291,
CVE-2022-21305,
CVE-2022-21277,
CVE-2022-21360,
CVE-2022-21365,
CVE-2022-21366,
CVE-2022-21282,
CVE-2022-21296,
CVE-2022-21299,
CVE-2022-21271,
CVE-2022-21283,
CVE-2022-21293,
CVE-2022-21294,
CVE-2022-21340,
CVE-2022-21341,
CVE-2022-21248
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Windows 10 CVE-2021-22947,
CVE-2021-36957,
CVE-2021-36976,
CVE-2021-38631,
CVE-2021-38665,
CVE-2021-38666,
CVE-2021-41333,
CVE-2021-41356,
CVE-2021-41366,
CVE-2021-41367,
CVE-2021-41370,
CVE-2021-41371,
CVE-2021-41377,
CVE-2021-41378,
CVE-2021-41379,
CVE-2021-42275,
CVE-2021-42276,
CVE-2021-42277,
CVE-2021-42279,
CVE-2021-42280,
CVE-2021-42283,
CVE-2021-42285,
CVE-2021-42288,
CVE-2021-43207,
CVE-2021-43215,
CVE-2021-43216,
CVE-2021-43217,
CVE-2021-43219,
CVE-2021-43222,
CVE-2021-43223,
CVE-2021-43224, 
CVE-2021-43226,
CVE-2021-43227,
CVE-2021-43228,
CVE-2021-43229, 
CVE-2021-43230,
CVE-2021-43231,
CVE-2021-43232,
CVE-2021-43233,
CVE-2021-43234,
CVE-2021-43235,
CVE-2021-43236,
CVE-2021-43238,
CVE-2021-43244,
CVE-2021-43247,
CVE-2021-43248,
CVE-2021-43883,
CVE-2021-43893,
CVE-2022-21833,
CVE-2022-21834, 
CVE-2022-21835,
CVE-2022-21836,
CVE-2022-21838,
CVE-2022-21839,
CVE-2022-21843,
CVE-2022-21848,
CVE-2022-21849,
CVE-2022-21850,
CVE-2022-21851,
CVE-2022-21852,
CVE-2022-21857,
CVE-2022-21858,
CVE-2022-21859,
CVE-2022-21860,
CVE-2022-21861,
CVE-2022-21862,
CVE-2022-21863,
CVE-2022-21864,
CVE-2022-21865,
CVE-2022-21866,
CVE-2022-21867,
CVE-2022-21868,
CVE-2022-21869,
CVE-2022-21870,
CVE-2022-21871,
CVE-2022-21872,
CVE-2022-21873,
CVE-2022-21874,
CVE-2022-21875,
CVE-2022-21876,
CVE-2022-21877,
CVE-2022-21878,
CVE-2022-21879,
CVE-2022-21880,
CVE-2022-21881,
CVE-2022-21882,
CVE-2022-21883,
CVE-2022-21885,
CVE-2022-21888,
CVE-2022-21889,
CVE-2022-21890,
CVE-2022-21892,
CVE-2022-21893,
CVE-2022-21894,
CVE-2022-21895,
CVE-2022-21896,
CVE-2022-21897,
CVE-2022-21898,
CVE-2022-21902,
CVE-2022-21903,
CVE-2022-21904,
CVE-2022-21906,
CVE-2022-21907,
CVE-2022-21908,
CVE-2022-21912,
CVE-2022-21913,
CVE-2022-21914,
CVE-2022-21915,
CVE-2022-21916,
CVE-2022-21918,
CVE-2022-21919,
CVE-2022-21920,
CVE-2022-21922,
CVE-2022-21924,
CVE-2022-21928,
CVE-2022-21958,
CVE-2022-21959,
CVE-2022-21960,
CVE-2022-21961,
CVE-2022-21962,
CVE-2022-21963
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Affected Versions Updated Versions Link to Update
Unisphere for PowerMax Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere for PowerMax Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere 360 Versions before 9.1.0.30 9.1.0.30 Unisphere 360 Drivers & Downloads
Unisphere 360 Versions before 9.2.3.4 9.2.3.4 Unisphere 360 Drivers & Downloads
Solutions Enabler Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Virtual Appliance Drivers & Downloads
Solutions Enabler Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Virtual Appliance Drivers & Downloads
VASA Provider Versions before 9.1.0.724 9.1.0.724 VASA Provider Drivers & Downloads
VASA Provider Versions before 9.2.3.10 9.2.3.10 VASA Provider Drivers & Downloads
PowerMax OS 5978 5978 Request OPT 596274 for Foxtail SR and Hickory SR
 


Note: Virtual Appliance (vApp) upgrade from 9.0.x to 9.1.x is impacted by CVE-2021-4034. Customers must upgrade the above deployment with the latest 2022 Q1 SR 9.1.0.32 ISO image. The latest SUSE patches are included in the latest ISO image: libpolkit0-0.113-5.24.1.x86_64.rpm and polkit-0.113-5.24.1.x86_64.rpm. Fresh installs of the vApp versions 9.1.x and 9.2.x. are not impacted by CVE-2021-4034. 
Product Affected Versions Updated Versions Link to Update
Unisphere for PowerMax Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere for PowerMax Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere 360 Versions before 9.1.0.30 9.1.0.30 Unisphere 360 Drivers & Downloads
Unisphere 360 Versions before 9.2.3.4 9.2.3.4 Unisphere 360 Drivers & Downloads
Solutions Enabler Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Virtual Appliance Drivers & Downloads
Solutions Enabler Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Virtual Appliance Drivers & Downloads
VASA Provider Versions before 9.1.0.724 9.1.0.724 VASA Provider Drivers & Downloads
VASA Provider Versions before 9.2.3.10 9.2.3.10 VASA Provider Drivers & Downloads
PowerMax OS 5978 5978 Request OPT 596274 for Foxtail SR and Hickory SR
 


Note: Virtual Appliance (vApp) upgrade from 9.0.x to 9.1.x is impacted by CVE-2021-4034. Customers must upgrade the above deployment with the latest 2022 Q1 SR 9.1.0.32 ISO image. The latest SUSE patches are included in the latest ISO image: libpolkit0-0.113-5.24.1.x86_64.rpm and polkit-0.113-5.24.1.x86_64.rpm. Fresh installs of the vApp versions 9.1.x and 9.2.x. are not impacted by CVE-2021-4034. 

Revision History

RevisionDateDescription
1.02022-03-23PowerMax Q1 2022 Quarterly Security Update
2.02022-04-22Added note to address CVE-2021-4034

Acknowledgements

CVE-2021-36339: Dell Technologies would like to thank Thorsten Tüllmann for reporting the Virtual Appliance privilege escalation vulnerability.
 

Related Information

Affected Products

PowerMax, PowerMax 2000, PowerMax 8000, PowerMaxOS 5978, Product Security Information, Solutions Enabler, Solutions Enabler Series, Unisphere 360, Unisphere for VMAX, Unisphere for PowerMax, VASA Provider, VMAX, VMAX 200K, VMAX 450F
Article Properties
Article Number: 000197693
Article Type: Dell Security Advisory
Last Modified: 06 Jun 2022
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.