Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Profitez de récompenses et de remises réservées aux membres
  • Créez et accédez à une liste de vos produits

DSA-2021-164: Dell VNX2 Operating Environment for File Security Update for Multiple Vulnerabilities

Résumé: Dell VNX2 Operating Environment for File contains remediation for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.

Cet article concerne   Cet article ne concerne pas 

Impact

Critical

Détails

Proprietary
Code CVEs
Description CVSS Base
Score
CVSS Vector String
CVE-2021-36287 Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to run commands on the system. 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE-2021-36288 Dell VNX2 for File version 8.1.21.266 and earlier, contain a path traversal vulnerability which may lead unauthenticated users to read/write restricted files. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
CVE-2021-36289 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information.
 
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36290 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36293 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain elevated privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36294 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability leading to authentication bypass and complete takeover of the VNX system. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36295 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36296 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H


Note: The two vulnerabilities CVE-2021-36295 and CVE-2021-36296 were reported as a vulnerability chain with CVE-2021-36294. The cumulative score of the vulnerability chain: 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.

 
Third-party Component CVEs More Information
JRE  CVE-2021-3517 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
CVE-2021-35560
CVE-2021-35567
NTLM CVE-2021-31958
Proprietary
Code CVEs
Description CVSS Base
Score
CVSS Vector String
CVE-2021-36287 Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to run commands on the system. 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE-2021-36288 Dell VNX2 for File version 8.1.21.266 and earlier, contain a path traversal vulnerability which may lead unauthenticated users to read/write restricted files. 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
CVE-2021-36289 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information.
 
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36290 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36293 Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain elevated privileges. 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36294 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability leading to authentication bypass and complete takeover of the VNX system. 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36295 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-36296 Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to run commands. 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H


Note: The two vulnerabilities CVE-2021-36295 and CVE-2021-36296 were reported as a vulnerability chain with CVE-2021-36294. The cumulative score of the vulnerability chain: 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.

 
Third-party Component CVEs More Information
JRE  CVE-2021-3517 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
CVE-2021-35560
CVE-2021-35567
NTLM CVE-2021-31958
Dell Technologies recommande à tous les clients de prendre en compte à la fois le score de base CVSS et les scores temporels et environnementaux pertinents qui peuvent avoir un impact sur la gravité potentielle associée à une faille de sécurité donnée.

Produits concernés et mesure corrective

Product Affected Versions Updated Versions Link to Update
VNX2 Version 8.1.21.266 (file), version 5.33.021.5.266 (block) and earlier Version 8.1.21.303 (file)
Version 5.33.021.5.303 (block)
Download and install the appropriate version by VNX2 code family: https://www.dell.com/support/home/en-us/product-support/product/vnxe1600/.
Product Affected Versions Updated Versions Link to Update
VNX2 Version 8.1.21.266 (file), version 5.33.021.5.266 (block) and earlier Version 8.1.21.303 (file)
Version 5.33.021.5.303 (block)
Download and install the appropriate version by VNX2 code family: https://www.dell.com/support/home/en-us/product-support/product/vnxe1600/.

Historique des révisions

RevisionDateDescription
1.02021-09-01Initial release with workarounds
1.12022-03-31Updated CVEs and link to update.
1.22022-07-20Removed EMS Firmware CVE-2018-9086

Remerciements

Dell would like to thank Guillaume Quéré for reporting CVE-2021-36287, CVE-2021-36288, CVE-2021-36289, CVE-2021-36290, CVE-2021-36293, CVE-2021-36294, CVE-2021-36295, and CVE-2021-36296.

Informations connexes

Produits concernés

Product Security Information, VNX VG10, VNX VG50, VNX2 Series, VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, VNX8000
Propriétés de l’article
Numéro d’article: 000191155
Type d’article: Dell Security Advisory
Dernière modification: 02 août 2022
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.
Propriétés de l’article
Numéro d’article: 000191155
Type d’article: Dell Security Advisory
Dernière modification: 02 août 2022
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.