DSA-2022-084: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities
Summary:Dell VxRail remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Please select a product to check article relevancy
This article applies to This article does not apply toThis article is not tied to any specific product.Not all product versions are identified in this article.
Dell KB article: DSA-2022-027 See Intel workaround below
PowerEdge Server
CVE-2021-26312
See Dell KB article: DSA-2022-126 for more details
CVE-2021-26339
CVE-2021-26342
CVE-2021-26347
CVE-2021-26348
CVE-2021-26349
CVE-2021-26350
CVE-2021-26364
CVE-2021-26372
CVE-2021-26373
CVE-2021-26375
CVE-2021-26376
CVE-2021-26378
CVE-2021-26388
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.
Affected Products & Remediation
Product
Affected Versions
Updated Version
Dell VxRail Appliance
7.0.x versions before 7.0.370
7.0.370 (See NOTE in Workarounds and Mitigations section below.)
Product
Affected Versions
Updated Version
Dell VxRail Appliance
7.0.x versions before 7.0.370
7.0.370 (See NOTE in Workarounds and Mitigations section below.)
Workarounds & Mitigations
NOTE: STIG hardening version 2.0.001 resolves the VMware issue described in VMware article 88055, which blocked STIG hardening of VxRail 7.0.370 and later. Additionally, if STIG hardening version 2.0.000 or earlier was applied to a VxRail cluster version 7.0.360 or earlier, STIG hardening version 2.0.001 must be applied before upgrading to VxRail 7.0.370 and later.
Caution: If running a STIG hardened VxRail version 7.0.370 or later, follow the steps seen in “Known issues” in the VxRail STIG Hardening Guide. However, if you have already removed the VMware ESXi STIG VIB, you can disregard this caution.