High
Third-Party Component | CVEs | More Information |
SOCKS5 | CVE-2023-38545 | https://nvd.nist.gov/vuln/detail/CVE-2023-38545 |
SLES 12 SP5 | CVE-2016-3709, CVE-2018-7738, CVE-2018-9234, CVE-2020-22218, CVE-2020-36766, CVE-2022-36402, CVE-2022-40982, CVE-2022-48565, CVE-2022-48566, CVE-2023-0394, CVE-2023-0459, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-1981, CVE-2023-2007, CVE-2023-20197, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-28484, CVE-2023-28736, CVE-2023-28938, CVE-2023-29469, CVE-2023-2985, CVE-2023-32182, CVE-2023-32360, CVE-2023-3341, CVE-2023-34241, CVE-2023-34319, CVE-2023-3446, CVE-2023-34969, CVE-2023-35001, CVE-2023-3567, CVE-2023-35945, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-3812, CVE-2023-3817, CVE-2023-38408, CVE-2023-38559, CVE-2023-3863, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-42754, CVE-2023-43115, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4622, CVE-2023-4623, CVE-2023-4641, CVE-2023-4692, CVE-2023-4693, CVE-2023-4881, CVE-2023-4921 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Oracle | CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Windows 10 | CVE-2023-36724, CVE-2023-36434, CVE-2023-36576, CVE-2023-36598, CVE-2023-36731, CVE-2023-36557, CVE-2023-36563, CVE-2023-36721, CVE-2023-44487, CVE-2023-36602, CVE-2023-36725, CVE-2023-36436, CVE-2023-36438, CVE-2023-36720, CVE-2023-36431, CVE-2023-36570, CVE-2023-36722, CVE-2023-36723, CVE-2023-36726, CVE-2023-36732, CVE-2023-41773, CVE-2023-41772, CVE-2023-41771, CVE-2023-41770, CVE-2023-41768, CVE-2023-41767, CVE-2023-36743, CVE-2023-36776, CVE-2023-38166, CVE-2023-36902, CVE-2023-35349, CVE-2023-36564, CVE-2023-36567, CVE-2023-36571, CVE-2023-36572, CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606, CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702, CVE-2023-36704, CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712, CVE-2023-36713, CVE-2023-36729, CVE-2023-41774, CVE-2023-41769, CVE-2023-41766, CVE-2023-41765, CVE-2023-38159, CVE-2023-36794, CVE-2023-36792, CVE-2023-36796, CVE-2023-36788, CVE-2023-36793, CVE-2023-36803, CVE-2023-38142, CVE-2023-38160, CVE-2023-38161, CVE-2023-36802, CVE-2023-36804, CVE-2023-36805, CVE-2023-38139, CVE-2023-38140, CVE-2023-38141, CVE-2023-38143, CVE-2023-38144, CVE-2023-38147, CVE-2023-38149, CVE-2023-35355, CVE-2023-36899, CVE-2023-36873, CVE-2023-38172, CVE-2023-38184, CVE-2023-35387, CVE-2023-35386, CVE-2023-35385, CVE-2023-35384, CVE-2023-35383, CVE-2023-35380, CVE-2023-35378, CVE-2023-35377, CVE-2023-38254, CVE-2023-36913, CVE-2023-36911, CVE-2023-36907, CVE-2023-36889 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2023-48660 | Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVE-2023-48661 | Dell vApp Manager, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability to read arbitrary files from the target system. | 4.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
CVE-2023-48662 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48663 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48664 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48665 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48671 | Dell vApp Manager, versions prior to 9.2.4.x contain an information disclosure vulnerability. A remote attacker could potentially exploit this vulnerability leading to obtain sensitive information that may aid in further attacks. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2023-48660 | Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVE-2023-48661 | Dell vApp Manager, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability to read arbitrary files from the target system. | 4.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
CVE-2023-48662 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48663 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48664 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48665 | Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2023-48671 | Dell vApp Manager, versions prior to 9.2.4.x contain an information disclosure vulnerability. A remote attacker could potentially exploit this vulnerability leading to obtain sensitive information that may aid in further attacks. | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere for PowerMax | Host Installation | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Unisphere for PowerMax Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere 360 | Host Installation | Versions prior to 9.2.4.11 | Version 9.2.4.11 | https://www.dell.com/support/home/product-support/product/unisphere-360/drivers |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Solutions Enabler Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.5 | Version 9.2.4.5 | https://www.dell.com/support/home/product-support/product/solutions-enabler/drivers |
CVE-2016-3709, CVE-2018-7738, CVE-2018-9234, CVE-2020-22218, CVE-2020-36766, CVE-2022-36402, CVE-2022-40982, CVE-2022-48565, CVE-2022-48566, CVE-2023-0394, CVE-2023-0459, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-1981, CVE-2023-2007, CVE-2023-20197, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-28484, CVE-2023-28736, CVE-2023-28938, CVE-2023-29469, CVE-2023-2985, CVE-2023-32182, CVE-2023-32360, CVE-2023-3341, CVE-2023-34241, CVE-2023-34319, CVE-2023-3446, CVE-2023-34969, CVE-2023-35001, CVE-2023-3567, CVE-2023-35945, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-3812, CVE-2023-3817, CVE-2023-38408, CVE-2023-38559, CVE-2023-3863, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-42754, CVE-2023-43115, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4622, CVE-2023-4623, CVE-2023-4641, CVE-2023-4692, CVE-2023-4693, CVE-2023-4881, CVE-2023-4921, CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Dell PowerMax EEM | Embedded Management | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
CVE-2023-36724, CVE-2023-36434, CVE-2023-36576, CVE-2023-36598, CVE-2023-36731, CVE-2023-36557, CVE-2023-36563, CVE-2023-36721, CVE-2023-44487, CVE-2023-36602, CVE-2023-36725, CVE-2023-36436, CVE-2023-36438, CVE-2023-36720, CVE-2023-36431, CVE-2023-36570, CVE-2023-36722, CVE-2023-36723, CVE-2023-36726, CVE-2023-36732, CVE-2023-41773, CVE-2023-41772, CVE-2023-41771, CVE-2023-41770, CVE-2023-41768, CVE-2023-41767, CVE-2023-36743, CVE-2023-36776, CVE-2023-38166, CVE-2023-36902, CVE-2023-35349, CVE-2023-36564, CVE-2023-36567, CVE-2023-36571, CVE-2023-36572, CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606, CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702, CVE-2023-36704, CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712, CVE-2023-36713, CVE-2023-36729, CVE-2023-41774, CVE-2023-41769, CVE-2023-41766, CVE-2023-41765, CVE-2023-38159, CVE-2023-36794, CVE-2023-36792, CVE-2023-36796, CVE-2023-36788, CVE-2023-36793, CVE-2023-36803, CVE-2023-38142, CVE-2023-38160, CVE-2023-38161, CVE-2023-36802, CVE-2023-36804, CVE-2023-36805, CVE-2023-38139, CVE-2023-38140, CVE-2023-38141, CVE-2023-38143, CVE-2023-38144, CVE-2023-38147, CVE-2023-38149, CVE-2023-35355, CVE-2023-36899, CVE-2023-36873, CVE-2023-38172, CVE-2023-38184, CVE-2023-35387, CVE-2023-35386, CVE-2023-35385, CVE-2023-35384, CVE-2023-35383, CVE-2023-35380, CVE-2023-35378, CVE-2023-35377, CVE-2023-38254, CVE-2023-36913, CVE-2023-36911, CVE-2023-36907, CVE-2023-36889 | PowerMaxOS 5978 | PowerMax OS | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere for PowerMax | Host Installation | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Unisphere for PowerMax Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.7 | Version 9.2.4.7 | https://www.dell.com/support/home/product-support/product/unisphere-powermax/drivers |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025 | Unisphere 360 | Host Installation | Versions prior to 9.2.4.11 | Version 9.2.4.11 | https://www.dell.com/support/home/product-support/product/unisphere-360/drivers |
CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Solutions Enabler Virtual Appliance | Virtual Appliance | Versions prior to 9.2.4.5 | Version 9.2.4.5 | https://www.dell.com/support/home/product-support/product/solutions-enabler/drivers |
CVE-2016-3709, CVE-2018-7738, CVE-2018-9234, CVE-2020-22218, CVE-2020-36766, CVE-2022-36402, CVE-2022-40982, CVE-2022-48565, CVE-2022-48566, CVE-2023-0394, CVE-2023-0459, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-1981, CVE-2023-2007, CVE-2023-20197, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-28484, CVE-2023-28736, CVE-2023-28938, CVE-2023-29469, CVE-2023-2985, CVE-2023-32182, CVE-2023-32360, CVE-2023-3341, CVE-2023-34241, CVE-2023-34319, CVE-2023-3446, CVE-2023-34969, CVE-2023-35001, CVE-2023-3567, CVE-2023-35945, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-3812, CVE-2023-3817, CVE-2023-38408, CVE-2023-38559, CVE-2023-3863, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-42754, CVE-2023-43115, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4622, CVE-2023-4623, CVE-2023-4641, CVE-2023-4692, CVE-2023-4693, CVE-2023-4881, CVE-2023-4921, CVE-2023-30589, CVE-2023-22067, CVE-2023-22081, CVE-2023-22091, CVE-2023-22025, CVE-2023-38545, CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671 | Dell PowerMax EEM | Embedded Management | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
CVE-2023-36724, CVE-2023-36434, CVE-2023-36576, CVE-2023-36598, CVE-2023-36731, CVE-2023-36557, CVE-2023-36563, CVE-2023-36721, CVE-2023-44487, CVE-2023-36602, CVE-2023-36725, CVE-2023-36436, CVE-2023-36438, CVE-2023-36720, CVE-2023-36431, CVE-2023-36570, CVE-2023-36722, CVE-2023-36723, CVE-2023-36726, CVE-2023-36732, CVE-2023-41773, CVE-2023-41772, CVE-2023-41771, CVE-2023-41770, CVE-2023-41768, CVE-2023-41767, CVE-2023-36743, CVE-2023-36776, CVE-2023-38166, CVE-2023-36902, CVE-2023-35349, CVE-2023-36564, CVE-2023-36567, CVE-2023-36571, CVE-2023-36572, CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606, CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702, CVE-2023-36704, CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712, CVE-2023-36713, CVE-2023-36729, CVE-2023-41774, CVE-2023-41769, CVE-2023-41766, CVE-2023-41765, CVE-2023-38159, CVE-2023-36794, CVE-2023-36792, CVE-2023-36796, CVE-2023-36788, CVE-2023-36793, CVE-2023-36803, CVE-2023-38142, CVE-2023-38160, CVE-2023-38161, CVE-2023-36802, CVE-2023-36804, CVE-2023-36805, CVE-2023-38139, CVE-2023-38140, CVE-2023-38141, CVE-2023-38143, CVE-2023-38144, CVE-2023-38147, CVE-2023-38149, CVE-2023-35355, CVE-2023-36899, CVE-2023-36873, CVE-2023-38172, CVE-2023-38184, CVE-2023-35387, CVE-2023-35386, CVE-2023-35385, CVE-2023-35384, CVE-2023-35383, CVE-2023-35380, CVE-2023-35378, CVE-2023-35377, CVE-2023-38254, CVE-2023-36913, CVE-2023-36911, CVE-2023-36907, CVE-2023-36889 | PowerMaxOS 5978 | PowerMax OS | Version 5978 | Version 5978.714.714 Patch 10120 | Contact customer support and request DSA-2023-443 |
Revision | Date | Description |
1.0 | 2023-12-13 | Initial Version |
2.0 | 2024-06-13 | Updated for enhanced presentation with no changes to content |
CVE-2023-48660, CVE-2023-48661, CVE-2023-48662, CVE-2023-48663, CVE-2023-48664, CVE-2023-48665, CVE-2023-48671: Dell Technologies would like to thank 33a6099 for reporting these issues.