Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Créez et accédez à une liste de vos produits
  • Gérer vos sites, vos produits et vos contacts au niveau des produits Dell EMC à l’aide de la rubrique Gestion des informations de l’entreprise.

Numéro d’article: 000188311


DSA-2021-124: Dell EMC NetWorker Security Update for Multiple Vulnerabilities

Résumé: Mitigations are available for multiple vulnerabilities affecting Dell EMC NetWorker that may be exploited by malicious users to gain access to unauthorized information.

Contenu de l’article


Impact

Medium

Détails

 
Propriety Code CVEs  Description CVSS Base Score CVSS Vector String
CVE-2021-21569 Dell NetWorker, versions 18.x and 19.x contain a Path traversal vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.  6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CVE-2021-21570
 
Dell NetWorker, versions 18.x and 19.x contain an Information disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information. 6.8 CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H


 
Propriety Code CVEs  Description CVSS Base Score CVSS Vector String
CVE-2021-21569 Dell NetWorker, versions 18.x and 19.x contain a Path traversal vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.  6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CVE-2021-21570
 
Dell NetWorker, versions 18.x and 19.x contain an Information disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information. 6.8 CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H


Dell Technologies recommande à tous les clients de prendre en compte à la fois le score de base CVSS et les scores temporels et environnementaux pertinents qui peuvent avoir un impact sur la gravité potentielle associée à une faille de sécurité donnée.

Produits concernés et mesure corrective

CVEs Addressed Product Affected Versions Updated Version Link to Update
CVE-2021-21569 Dell EMC NetWorker Dell EMC NetWorker 18.x, 19.1.x, 19.2.x, 19.3.x, and 19.4.x versions prior to 19.4.0.4 19.4.0.4

If an updated version cannot be applied, follow the workaround that is detailed in the Workarounds and Mitigations section of this DSA.
https://www.dell.com/support/home/en-in/product-support/product/networker/drivers
CVE-2021-21570
CVEs Addressed Product Affected Versions Updated Version Link to Update
CVE-2021-21569 Dell EMC NetWorker Dell EMC NetWorker 18.x, 19.1.x, 19.2.x, 19.3.x, and 19.4.x versions prior to 19.4.0.4 19.4.0.4

If an updated version cannot be applied, follow the workaround that is detailed in the Workarounds and Mitigations section of this DSA.
https://www.dell.com/support/home/en-in/product-support/product/networker/drivers
CVE-2021-21570

Solutions de contournement et mesures d’atténuation des risques

These vulnerabilities can be partially mitigated by configuring the Dell EMC NetWorker server to use nsrauth authentication, and configuring the NetWorker nonempty servers file. Follow the recommendations in the security configuration guide for your product version. These actions limit the scope of exploitation to authorized NetWorker users already defined with “Operator” level or higher privileges.

Mitigation procedure:
Step 1:
Configure the Dell EMC NetWorker server to use nsrauth:
See Security Configuration Guide Chapter 2.
Access Control Settings:
Component access control > Component authentication > Modifying the authentication methods used by NetWorker hosts

Step 2:
Configure the NetWorker nonempty servers file:
See Security Configuration Guide Chapter 2.
Access Control Settings:
Component access control > Component authorization > Restricting remote program executions and client-tasking rights

Note: If you are unsure of your NetWorker server's hostname or IP address, it is recommended to update the servers file with local hostname or IP address.

Security Configuration Guide Links:   

Remerciements

Dell would like to thank Quentin Kaiser for reporting these vulnerabilities.

Historique des révisions

RevisionDateDescription
1.02021-06-12Initial Release
1.12021-09-02Updated 'Affected Products and Remediation' Section

Informations connexes


Propriétés de l’article


Produit concerné

NetWorker Family, NetWorker, NetWorker Series, Product Security Information

Dernière date de publication

02 sept. 2021

Type d’article

Dell Security Advisory