Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

DSA-2022-134: Dell Wyse Management Suite Security Update for Multiple Vulnerabilities.

Summary: Dell Wyse Management Suite (WMS) remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

This article applies to   This article does not apply to 

Impact

High

Details

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2022-33924

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability with which an attacker with no access to create rules may potentially exploit this vulnerability and create rules. The attacker may create a schedule to run the rule.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVE-2022-33925

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. A remote authenticated attacker may potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitive information.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2022-33926

Wyse Management Suite 3.7 and earlier contains an improper access control vulnerability. A remote malicious user may exploit this vulnerability in order to retain access to a file repository after it has been revoked.

7.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

CVE-2022-33927

Wyse Management Suite 3.7 and earlier contains a Session Fixation vulnerability. An unauthenticated attacker may exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2022-33928

Wyse Management Suite 3.7 and earlier contains a Plain-text Password Storage Vulnerability in UI. An attacker with low privileges may potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

6.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

CVE-2022-29090

Wyse Management Suite 3.7 and earlier contains a Sensitive Data Exposure vulnerability. A low privileged malicious user may potentially exploit this vulnerability in order to obtain credentials. The attacker may be able to use the exposed credentials to access the target device and perform unauthorized actions.

8.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

CVE-2022-33929

Wyse Management Suite 3.7 and earlier contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker may potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2022-33930

Wyse Management Suite 3.7 and earlier contains Information Disclosure in Devices error pages. An attacker may potentially exploit this vulnerability, leading to the disclosure of certain sensitive information. The attacker may be able to use the exposed information for access and further vulnerability research.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2022-33931

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. An attacker with no access to Alert Classification page may potentially exploit this vulnerability, leading to changing the alert categories.

6.3

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

CVE-2022-34365

Wyse Management Suite 3.7 contains a Path Traversal Vulnerability in Device API. An attacker may potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server file system, with the privileges of the running web application.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

 
Third-party Component CVEs More information
OpenJDK CVE-2022-21476 CVE-2022-21449 CVE-2022-21496 CVE-2022-21434 CVE-2022-21426 CVE-2022-21443 See NVD (http://nvd.nist.gov/ This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
Zlib CVE-2018-25032
Dapper CVE-2017-15945
Spring Framework CVE-2022-22971 CVE-2022-22970 CVE-2022-22968
Spring Security CVE-2022-22978 CVE-2022-22976
Netty CVE-2022-24823 CVE-2022-25647
Apache tika CVE-2022-30126 CVE-2022-25169
Tomcat CVE-2022-29885

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2022-33924

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability with which an attacker with no access to create rules may potentially exploit this vulnerability and create rules. The attacker may create a schedule to run the rule.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVE-2022-33925

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. A remote authenticated attacker may potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitive information.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2022-33926

Wyse Management Suite 3.7 and earlier contains an improper access control vulnerability. A remote malicious user may exploit this vulnerability in order to retain access to a file repository after it has been revoked.

7.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

CVE-2022-33927

Wyse Management Suite 3.7 and earlier contains a Session Fixation vulnerability. An unauthenticated attacker may exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.

5.4

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2022-33928

Wyse Management Suite 3.7 and earlier contains a Plain-text Password Storage Vulnerability in UI. An attacker with low privileges may potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

6.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

CVE-2022-29090

Wyse Management Suite 3.7 and earlier contains a Sensitive Data Exposure vulnerability. A low privileged malicious user may potentially exploit this vulnerability in order to obtain credentials. The attacker may be able to use the exposed credentials to access the target device and perform unauthorized actions.

8.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

CVE-2022-33929

Wyse Management Suite 3.7 and earlier contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker may potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2022-33930

Wyse Management Suite 3.7 and earlier contains Information Disclosure in Devices error pages. An attacker may potentially exploit this vulnerability, leading to the disclosure of certain sensitive information. The attacker may be able to use the exposed information for access and further vulnerability research.

4.3

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2022-33931

Wyse Management Suite 3.7 and earlier contains an Improper Access control vulnerability in UI. An attacker with no access to Alert Classification page may potentially exploit this vulnerability, leading to changing the alert categories.

6.3

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

CVE-2022-34365

Wyse Management Suite 3.7 contains a Path Traversal Vulnerability in Device API. An attacker may potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server file system, with the privileges of the running web application.

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

 
Third-party Component CVEs More information
OpenJDK CVE-2022-21476 CVE-2022-21449 CVE-2022-21496 CVE-2022-21434 CVE-2022-21426 CVE-2022-21443 See NVD (http://nvd.nist.gov/ This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
Zlib CVE-2018-25032
Dapper CVE-2017-15945
Spring Framework CVE-2022-22971 CVE-2022-22970 CVE-2022-22968
Spring Security CVE-2022-22978 CVE-2022-22976
Netty CVE-2022-24823 CVE-2022-25647
Apache tika CVE-2022-30126 CVE-2022-25169
Tomcat CVE-2022-29885
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Affected Versions Updated Versions Link to Update  
Dell Wyse Management Suite 3.7 and earlier 3.8 Dell Wyse Management Suite  
 
Product Affected Versions Updated Versions Link to Update  
Dell Wyse Management Suite 3.7 and earlier 3.8 Dell Wyse Management Suite  
 

Revision History

RevisionDateDescription
1.02022-07-18Initial Release

Acknowledgements

Dell Technologies would like to thank CMSecurity for reporting CVE-2022-33927.
Dell Technologies would like to thank whitehattushu for reporting CVE-2022-33924, CVE-2022-33925, and CVE-2022-33926.

Related Information

Affected Products

Wyse Management Suite
Article Properties
Article Number: 000201383
Article Type: Dell Security Advisory
Last Modified: 06 Dec 2023
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.