Ga naar hoofdinhoud
  • Snel en eenvoudig bestellen
  • Bestellingen en de verzendstatus bekijken
  • Een lijst met producten maken en openen

DSA-2022-073: Dell Unisphere for PowerMax, Dell Unisphere for PowerMax vApp, Dell Solutions Enabler vApp, Dell Unisphere 360, Dell VASA Provider vApp, and Dell PowerMax Embedded Management Security Update for Multiple Vulnerabilities

Samenvatting: Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, Dell Unisphere 360, Dell VASA Provider Virtual Appliance, and Dell PowerMax Embedded Management remediation is available for multiple security vulnerabilities that may potentially be exploited by malicious users to compromise the affected system. ...

Dit artikel is van toepassing op Dit artikel is niet van toepassing op Dit artikel is niet gebonden aan een specifiek product. Niet alle productversies worden in dit artikel vermeld.

Impact

High

Gegevens

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-36339 The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts.  A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance.

Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226.

Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity.
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


 
Third-party Component CVEs More information
SUSE Linux Enterprise Server 12 SP5 See SUSE Security Advisories. See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories.

SUSE-SU-2022:0030-1,
SUSE-SU-2022:0189-1:
CVE-2021-4034 polkit fixes,
SUSE-SU-2021:4060-1,
SUSE-SU-2021:4004-1,
SUSE-SU-2021:3951-1,
SUSE-SU-2021:3935-1,
SUSE-SU-2021:3878-1,
SUSE-SU-2021:3877-1,
SUSE-SU-2021:3875-1,
SUSE-SU-2021:3859-1,
SUSE-SU-2021:3853-1,
SUSE-SU-2021:3837-1,
SUSE-SU-2021:3748-1,
SUSE-SU-2021:3657-1,
SUSE-SU-2021:3652-1,
SUSE-SU-2021:3611-1,
SUSE-SU-2021:3524-1,
SUSE-SU-2021:3502-1,
SUSE-SU-2021:3491-1,
SUSE-SU-2021:3486-1,
SUSE-SU-2021:3477-1,
SUSE-SU-2021:3475-1,
SUSE-SU-2021:3463-1,
SUSE-SU-2021:3452-1,
SUSE-SU-2021:3237-1,
SUSE-SU-2021:3144-1,
SUSE-SU-2021:2930-1,
SUSE-SU-2021:2876-1,
SUSE-SU-2021:2825-1,
SUSE-SU-2021:2423-1,
SUSE-SU-2021:1621-1,
SUSE-SU-2021:0886-1,
SUSE-SU-2021:0794-1,
SUSE-SU-2021:0432-1,
SUSE-SU-2021:0344-1,
SUSE-SU-2020:3765-1,
SUSE-SU-2020:3596-1,
SUSE-SU-2020:3262-1,
SUSE-SU-2020:3121-1,
SUSE-SU-2020:2699-1,
SUSE-SU-2020:2275-1,
SUSE-SU-2020:1839-1,
SUSE-SU-2020:1732-1,
SUSE-SU-2020:1662-1,
SUSE-SU-2020:1612-1,
SUSE-SU-2020:1570-1,
SUSE-SU-2020:1550-1,
SUSE-SU-2020:1534-1,
SUSE-SU-2020:1524-1,
SUSE-SU-2020:1180-1,
SUSE-SU-2020:0854-1,
SUSE-SU-2020:0630-1,
SUSE-SU-2020:0545-1,
SUSE-SU-2020:0497-1,
SUSE-SU-2020:0457-1,
SUSE-SU-2020:0410-1,
SUSE-SU-2020:0331-1,
SUSE-SU-2020:0088-1,
SUSE-SU-2019:3180-1,
SUSE-SU-2019:3060-2,
SUSE-SU-2019:2972-1,
SUSE-SU-2019:2941-1,
SUSE-SU-2019:2936-1,
SUSE-SU-2019:2798-1,
SUSE-SU-2019:2781-1,
SUSE-SU-2019:2669-1,
SUSE-SU-2019:2339-2,
SUSE-SU-2019:2265-1,
SUSE-SU-2019:2264-1,
SUSE-SU-2019:2013-1,
SUSE-SU-2019:1972-1,
SUSE-SU-2019:1955-1,
SUSE-SU-2019:1733-1,
SUSE-SU-2019:1645-1,
SUSE-SU-2019:1606-2,
SUSE-SU-2019:1606-1,
SUSE-SU-2019:1468-1,
SUSE-SU-2019:1456-1,
SUSE-SU-2019:1379-1,
SUSE-SU-2019:1363-1,
SUSE-SU-2019:1265-1,
SUSE-SU-2019:1166-1,
SUSE-SU-2019:1111-1,
SUSE-SU-2019:1091-1,
SUSE-SU-2019:1060-1,
SUSE-SU-2019:0996-1,
SUSE-SU-2019:0956-1,
SUSE-SU-2019:0839-1,
SUSE-SU-2019:0838-1,
SUSE-SU-2019:0776-1,
SUSE-SU-2019:0747-1,
SUSE-SU-2019:0655-1,
SUSE-SU-2019:0450-1,
SUSE-SU-2019:0428-1,
SUSE-SU-2019:0249-1,
SUSE-SU-2019:0209-1,
SUSE-SU-2019:0135-1,
SUSE-SU-2018:4191-1,
SUSE-SU-2018:4149-1,
SUSE-SU-2018:3967-1,
SUSE-SU-2018:3926-1,
SUSE-SU-2018:3911-1,
SUSE-SU-2018:3884-1,
SUSE-SU-2018:3767-1,
SUSE-SU-2018:3640-1,
SUSE-SU-2018:3608-1,
SUSE-SU-2018:3545-1,
SUSE-SU-2018:3447-1,
SUSE-SU-2018:3289-1,
SUSE-SU-2018:3286-1,
SUSE-SU-2018:3219-1,
SUSE-SU-2018:3066-1,
SUSE-SU-2018:2991-1,
SUSE-SU-2018:2978-1,
SUSE-SU-2018:2842-1,
SUSE-SU-2018:2841-1,
SUSE-SU-2018:2837-1,
SUSE-SU-2018:2836-1,
SUSE-SU-2018:2835-1,
SUSE-SU-2018:2814-1,
SUSE-SU-2018:2779-1,
SUSE-SU-2018:2715-1,
SUSE-SU-2018:2451-2,
SUSE-SU-2018:2204-1,
SUSE-SU-2018:2171-1,
SUSE-SU-2018:2145-1,
SUSE-SU-2018:2071-1,
SUSE-SU-2018:2038-1,
SUSE-SU-2018:1997-1,
SUSE-SU-2018:1972-1,
SUSE-SU-2018:1950-1,
SUSE-SU-2018:1836-1,
SUSE-SU-2018:1826-1,
SUSE-SU-2018:1698-1,
SUSE-SU-2018:1401-1,
SUSE-SU-2018:1398-1,
SUSE-SU-2018:1373-1,
SUSE-SU-2018:1327-1,
SUSE-SU-2018:1288-1,
SUSE-SU-2018:1195-1,
SUSE-SU-2018:1180-1,
SUSE-SU-2018:1074-1,
SUSE-SU-2018:0926-1,
SUSE-SU-2018:0878-1,
SUSE-SU-2018:0858-1,
SUSE-SU-2018:0769-1,
SUSE-SU-2018:0673-1,
SUSE-SU-2018:0662-1,
SUSE-SU-2018:0650-1,
SUSE-SU-2018:0546-1,
SUSE-SU-2018:0510-1,
SUSE-SU-2018:0373-1,
SUSE-SU-2018:0337-1,
SUSE-SU-2018:0299-1,
SUSE-SU-2018:0295-1,
SUSE-SU-2018:0284-1,
SUSE-SU-2018:0260-1,
SUSE-SU-2018:0217-1,
SUSE-SU-2018:0200-1,
SUSE-SU-2018:0193-1,
SUSE-SU-2018:0181-1,
SUSE-SU-2018:0173-1,
SUSE-SU-2018:0135-1,
SUSE-SU-2018:0123-1,
SUSE-SU-2018:0122-1,
SUSE-SU-2018:0120-1,
SUSE-SU-2018:0073-1,
SUSE-SU-2017:3441-1,
SUSE-SU-2017:3214-1,
SUSE-SU-2017:3092-1,
SUSE-SU-2017:3048-1,
SUSE-SU-2017:2947-1,
SUSE-SU-2017:2871-2,
SUSE-SU-2017:2854-1,
SUSE-SU-2017:2831-1,
SUSE-SU-2017:2569-1,
SUSE-SU-2017:2381-1,
SUSE-SU-2017:2344-1,
SUSE-SU-2017:2318-1,
SUSE-SU-2017:2299-1,
SUSE-SU-2017:2264-1,
SUSE-SU-2017:2174-1,
SUSE-SU-2017:2129-1,
SUSE-SU-2017:2117-1,
SUSE-SU-2017:2075-1,
SUSE-SU-2017:2031-1
Oracle CVE-2021-22959,
CVE-2022-21349,
CVE-2022-21291,
CVE-2022-21305,
CVE-2022-21277,
CVE-2022-21360,
CVE-2022-21365,
CVE-2022-21366,
CVE-2022-21282,
CVE-2022-21296,
CVE-2022-21299,
CVE-2022-21271,
CVE-2022-21283,
CVE-2022-21293,
CVE-2022-21294,
CVE-2022-21340,
CVE-2022-21341,
CVE-2022-21248
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Windows 10 CVE-2021-22947,
CVE-2021-36957,
CVE-2021-36976,
CVE-2021-38631,
CVE-2021-38665,
CVE-2021-38666,
CVE-2021-41333,
CVE-2021-41356,
CVE-2021-41366,
CVE-2021-41367,
CVE-2021-41370,
CVE-2021-41371,
CVE-2021-41377,
CVE-2021-41378,
CVE-2021-41379,
CVE-2021-42275,
CVE-2021-42276,
CVE-2021-42277,
CVE-2021-42279,
CVE-2021-42280,
CVE-2021-42283,
CVE-2021-42285,
CVE-2021-42288,
CVE-2021-43207,
CVE-2021-43215,
CVE-2021-43216,
CVE-2021-43217,
CVE-2021-43219,
CVE-2021-43222,
CVE-2021-43223,
CVE-2021-43224, 
CVE-2021-43226,
CVE-2021-43227,
CVE-2021-43228,
CVE-2021-43229, 
CVE-2021-43230,
CVE-2021-43231,
CVE-2021-43232,
CVE-2021-43233,
CVE-2021-43234,
CVE-2021-43235,
CVE-2021-43236,
CVE-2021-43238,
CVE-2021-43244,
CVE-2021-43247,
CVE-2021-43248,
CVE-2021-43883,
CVE-2021-43893,
CVE-2022-21833,
CVE-2022-21834, 
CVE-2022-21835,
CVE-2022-21836,
CVE-2022-21838,
CVE-2022-21839,
CVE-2022-21843,
CVE-2022-21848,
CVE-2022-21849,
CVE-2022-21850,
CVE-2022-21851,
CVE-2022-21852,
CVE-2022-21857,
CVE-2022-21858,
CVE-2022-21859,
CVE-2022-21860,
CVE-2022-21861,
CVE-2022-21862,
CVE-2022-21863,
CVE-2022-21864,
CVE-2022-21865,
CVE-2022-21866,
CVE-2022-21867,
CVE-2022-21868,
CVE-2022-21869,
CVE-2022-21870,
CVE-2022-21871,
CVE-2022-21872,
CVE-2022-21873,
CVE-2022-21874,
CVE-2022-21875,
CVE-2022-21876,
CVE-2022-21877,
CVE-2022-21878,
CVE-2022-21879,
CVE-2022-21880,
CVE-2022-21881,
CVE-2022-21882,
CVE-2022-21883,
CVE-2022-21885,
CVE-2022-21888,
CVE-2022-21889,
CVE-2022-21890,
CVE-2022-21892,
CVE-2022-21893,
CVE-2022-21894,
CVE-2022-21895,
CVE-2022-21896,
CVE-2022-21897,
CVE-2022-21898,
CVE-2022-21902,
CVE-2022-21903,
CVE-2022-21904,
CVE-2022-21906,
CVE-2022-21907,
CVE-2022-21908,
CVE-2022-21912,
CVE-2022-21913,
CVE-2022-21914,
CVE-2022-21915,
CVE-2022-21916,
CVE-2022-21918,
CVE-2022-21919,
CVE-2022-21920,
CVE-2022-21922,
CVE-2022-21924,
CVE-2022-21928,
CVE-2022-21958,
CVE-2022-21959,
CVE-2022-21960,
CVE-2022-21961,
CVE-2022-21962,
CVE-2022-21963
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2021-36339 The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts.  A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance.

Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226.

Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity.
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


 
Third-party Component CVEs More information
SUSE Linux Enterprise Server 12 SP5 See SUSE Security Advisories. See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories.

SUSE-SU-2022:0030-1,
SUSE-SU-2022:0189-1:
CVE-2021-4034 polkit fixes,
SUSE-SU-2021:4060-1,
SUSE-SU-2021:4004-1,
SUSE-SU-2021:3951-1,
SUSE-SU-2021:3935-1,
SUSE-SU-2021:3878-1,
SUSE-SU-2021:3877-1,
SUSE-SU-2021:3875-1,
SUSE-SU-2021:3859-1,
SUSE-SU-2021:3853-1,
SUSE-SU-2021:3837-1,
SUSE-SU-2021:3748-1,
SUSE-SU-2021:3657-1,
SUSE-SU-2021:3652-1,
SUSE-SU-2021:3611-1,
SUSE-SU-2021:3524-1,
SUSE-SU-2021:3502-1,
SUSE-SU-2021:3491-1,
SUSE-SU-2021:3486-1,
SUSE-SU-2021:3477-1,
SUSE-SU-2021:3475-1,
SUSE-SU-2021:3463-1,
SUSE-SU-2021:3452-1,
SUSE-SU-2021:3237-1,
SUSE-SU-2021:3144-1,
SUSE-SU-2021:2930-1,
SUSE-SU-2021:2876-1,
SUSE-SU-2021:2825-1,
SUSE-SU-2021:2423-1,
SUSE-SU-2021:1621-1,
SUSE-SU-2021:0886-1,
SUSE-SU-2021:0794-1,
SUSE-SU-2021:0432-1,
SUSE-SU-2021:0344-1,
SUSE-SU-2020:3765-1,
SUSE-SU-2020:3596-1,
SUSE-SU-2020:3262-1,
SUSE-SU-2020:3121-1,
SUSE-SU-2020:2699-1,
SUSE-SU-2020:2275-1,
SUSE-SU-2020:1839-1,
SUSE-SU-2020:1732-1,
SUSE-SU-2020:1662-1,
SUSE-SU-2020:1612-1,
SUSE-SU-2020:1570-1,
SUSE-SU-2020:1550-1,
SUSE-SU-2020:1534-1,
SUSE-SU-2020:1524-1,
SUSE-SU-2020:1180-1,
SUSE-SU-2020:0854-1,
SUSE-SU-2020:0630-1,
SUSE-SU-2020:0545-1,
SUSE-SU-2020:0497-1,
SUSE-SU-2020:0457-1,
SUSE-SU-2020:0410-1,
SUSE-SU-2020:0331-1,
SUSE-SU-2020:0088-1,
SUSE-SU-2019:3180-1,
SUSE-SU-2019:3060-2,
SUSE-SU-2019:2972-1,
SUSE-SU-2019:2941-1,
SUSE-SU-2019:2936-1,
SUSE-SU-2019:2798-1,
SUSE-SU-2019:2781-1,
SUSE-SU-2019:2669-1,
SUSE-SU-2019:2339-2,
SUSE-SU-2019:2265-1,
SUSE-SU-2019:2264-1,
SUSE-SU-2019:2013-1,
SUSE-SU-2019:1972-1,
SUSE-SU-2019:1955-1,
SUSE-SU-2019:1733-1,
SUSE-SU-2019:1645-1,
SUSE-SU-2019:1606-2,
SUSE-SU-2019:1606-1,
SUSE-SU-2019:1468-1,
SUSE-SU-2019:1456-1,
SUSE-SU-2019:1379-1,
SUSE-SU-2019:1363-1,
SUSE-SU-2019:1265-1,
SUSE-SU-2019:1166-1,
SUSE-SU-2019:1111-1,
SUSE-SU-2019:1091-1,
SUSE-SU-2019:1060-1,
SUSE-SU-2019:0996-1,
SUSE-SU-2019:0956-1,
SUSE-SU-2019:0839-1,
SUSE-SU-2019:0838-1,
SUSE-SU-2019:0776-1,
SUSE-SU-2019:0747-1,
SUSE-SU-2019:0655-1,
SUSE-SU-2019:0450-1,
SUSE-SU-2019:0428-1,
SUSE-SU-2019:0249-1,
SUSE-SU-2019:0209-1,
SUSE-SU-2019:0135-1,
SUSE-SU-2018:4191-1,
SUSE-SU-2018:4149-1,
SUSE-SU-2018:3967-1,
SUSE-SU-2018:3926-1,
SUSE-SU-2018:3911-1,
SUSE-SU-2018:3884-1,
SUSE-SU-2018:3767-1,
SUSE-SU-2018:3640-1,
SUSE-SU-2018:3608-1,
SUSE-SU-2018:3545-1,
SUSE-SU-2018:3447-1,
SUSE-SU-2018:3289-1,
SUSE-SU-2018:3286-1,
SUSE-SU-2018:3219-1,
SUSE-SU-2018:3066-1,
SUSE-SU-2018:2991-1,
SUSE-SU-2018:2978-1,
SUSE-SU-2018:2842-1,
SUSE-SU-2018:2841-1,
SUSE-SU-2018:2837-1,
SUSE-SU-2018:2836-1,
SUSE-SU-2018:2835-1,
SUSE-SU-2018:2814-1,
SUSE-SU-2018:2779-1,
SUSE-SU-2018:2715-1,
SUSE-SU-2018:2451-2,
SUSE-SU-2018:2204-1,
SUSE-SU-2018:2171-1,
SUSE-SU-2018:2145-1,
SUSE-SU-2018:2071-1,
SUSE-SU-2018:2038-1,
SUSE-SU-2018:1997-1,
SUSE-SU-2018:1972-1,
SUSE-SU-2018:1950-1,
SUSE-SU-2018:1836-1,
SUSE-SU-2018:1826-1,
SUSE-SU-2018:1698-1,
SUSE-SU-2018:1401-1,
SUSE-SU-2018:1398-1,
SUSE-SU-2018:1373-1,
SUSE-SU-2018:1327-1,
SUSE-SU-2018:1288-1,
SUSE-SU-2018:1195-1,
SUSE-SU-2018:1180-1,
SUSE-SU-2018:1074-1,
SUSE-SU-2018:0926-1,
SUSE-SU-2018:0878-1,
SUSE-SU-2018:0858-1,
SUSE-SU-2018:0769-1,
SUSE-SU-2018:0673-1,
SUSE-SU-2018:0662-1,
SUSE-SU-2018:0650-1,
SUSE-SU-2018:0546-1,
SUSE-SU-2018:0510-1,
SUSE-SU-2018:0373-1,
SUSE-SU-2018:0337-1,
SUSE-SU-2018:0299-1,
SUSE-SU-2018:0295-1,
SUSE-SU-2018:0284-1,
SUSE-SU-2018:0260-1,
SUSE-SU-2018:0217-1,
SUSE-SU-2018:0200-1,
SUSE-SU-2018:0193-1,
SUSE-SU-2018:0181-1,
SUSE-SU-2018:0173-1,
SUSE-SU-2018:0135-1,
SUSE-SU-2018:0123-1,
SUSE-SU-2018:0122-1,
SUSE-SU-2018:0120-1,
SUSE-SU-2018:0073-1,
SUSE-SU-2017:3441-1,
SUSE-SU-2017:3214-1,
SUSE-SU-2017:3092-1,
SUSE-SU-2017:3048-1,
SUSE-SU-2017:2947-1,
SUSE-SU-2017:2871-2,
SUSE-SU-2017:2854-1,
SUSE-SU-2017:2831-1,
SUSE-SU-2017:2569-1,
SUSE-SU-2017:2381-1,
SUSE-SU-2017:2344-1,
SUSE-SU-2017:2318-1,
SUSE-SU-2017:2299-1,
SUSE-SU-2017:2264-1,
SUSE-SU-2017:2174-1,
SUSE-SU-2017:2129-1,
SUSE-SU-2017:2117-1,
SUSE-SU-2017:2075-1,
SUSE-SU-2017:2031-1
Oracle CVE-2021-22959,
CVE-2022-21349,
CVE-2022-21291,
CVE-2022-21305,
CVE-2022-21277,
CVE-2022-21360,
CVE-2022-21365,
CVE-2022-21366,
CVE-2022-21282,
CVE-2022-21296,
CVE-2022-21299,
CVE-2022-21271,
CVE-2022-21283,
CVE-2022-21293,
CVE-2022-21294,
CVE-2022-21340,
CVE-2022-21341,
CVE-2022-21248
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Windows 10 CVE-2021-22947,
CVE-2021-36957,
CVE-2021-36976,
CVE-2021-38631,
CVE-2021-38665,
CVE-2021-38666,
CVE-2021-41333,
CVE-2021-41356,
CVE-2021-41366,
CVE-2021-41367,
CVE-2021-41370,
CVE-2021-41371,
CVE-2021-41377,
CVE-2021-41378,
CVE-2021-41379,
CVE-2021-42275,
CVE-2021-42276,
CVE-2021-42277,
CVE-2021-42279,
CVE-2021-42280,
CVE-2021-42283,
CVE-2021-42285,
CVE-2021-42288,
CVE-2021-43207,
CVE-2021-43215,
CVE-2021-43216,
CVE-2021-43217,
CVE-2021-43219,
CVE-2021-43222,
CVE-2021-43223,
CVE-2021-43224, 
CVE-2021-43226,
CVE-2021-43227,
CVE-2021-43228,
CVE-2021-43229, 
CVE-2021-43230,
CVE-2021-43231,
CVE-2021-43232,
CVE-2021-43233,
CVE-2021-43234,
CVE-2021-43235,
CVE-2021-43236,
CVE-2021-43238,
CVE-2021-43244,
CVE-2021-43247,
CVE-2021-43248,
CVE-2021-43883,
CVE-2021-43893,
CVE-2022-21833,
CVE-2022-21834, 
CVE-2022-21835,
CVE-2022-21836,
CVE-2022-21838,
CVE-2022-21839,
CVE-2022-21843,
CVE-2022-21848,
CVE-2022-21849,
CVE-2022-21850,
CVE-2022-21851,
CVE-2022-21852,
CVE-2022-21857,
CVE-2022-21858,
CVE-2022-21859,
CVE-2022-21860,
CVE-2022-21861,
CVE-2022-21862,
CVE-2022-21863,
CVE-2022-21864,
CVE-2022-21865,
CVE-2022-21866,
CVE-2022-21867,
CVE-2022-21868,
CVE-2022-21869,
CVE-2022-21870,
CVE-2022-21871,
CVE-2022-21872,
CVE-2022-21873,
CVE-2022-21874,
CVE-2022-21875,
CVE-2022-21876,
CVE-2022-21877,
CVE-2022-21878,
CVE-2022-21879,
CVE-2022-21880,
CVE-2022-21881,
CVE-2022-21882,
CVE-2022-21883,
CVE-2022-21885,
CVE-2022-21888,
CVE-2022-21889,
CVE-2022-21890,
CVE-2022-21892,
CVE-2022-21893,
CVE-2022-21894,
CVE-2022-21895,
CVE-2022-21896,
CVE-2022-21897,
CVE-2022-21898,
CVE-2022-21902,
CVE-2022-21903,
CVE-2022-21904,
CVE-2022-21906,
CVE-2022-21907,
CVE-2022-21908,
CVE-2022-21912,
CVE-2022-21913,
CVE-2022-21914,
CVE-2022-21915,
CVE-2022-21916,
CVE-2022-21918,
CVE-2022-21919,
CVE-2022-21920,
CVE-2022-21922,
CVE-2022-21924,
CVE-2022-21928,
CVE-2022-21958,
CVE-2022-21959,
CVE-2022-21960,
CVE-2022-21961,
CVE-2022-21962,
CVE-2022-21963
See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Dell Technologies raadt aan dat alle klanten rekening houden met zowel de basisscore van CVSS als alle relevante tijdelijke en omgevingsscores die gevolgen kunnen hebben voor de mogelijke ernst van de specifieke beveiligingsproblemen.

Getroffen producten en herstel

Product Affected Versions Updated Versions Link to Update
Unisphere for PowerMax Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere for PowerMax Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere 360 Versions before 9.1.0.30 9.1.0.30 Unisphere 360 Drivers & Downloads
Unisphere 360 Versions before 9.2.3.4 9.2.3.4 Unisphere 360 Drivers & Downloads
Solutions Enabler Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Virtual Appliance Drivers & Downloads
Solutions Enabler Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Virtual Appliance Drivers & Downloads
VASA Provider Versions before 9.1.0.724 9.1.0.724 VASA Provider Drivers & Downloads
VASA Provider Versions before 9.2.3.10 9.2.3.10 VASA Provider Drivers & Downloads
PowerMax OS 5978 5978 Request OPT 596274 for Foxtail SR and Hickory SR
 


Note: Virtual Appliance (vApp) upgrade from 9.0.x to 9.1.x is impacted by CVE-2021-4034. Customers must upgrade the above deployment with the latest 2022 Q1 SR 9.1.0.32 ISO image. The latest SUSE patches are included in the latest ISO image: libpolkit0-0.113-5.24.1.x86_64.rpm and polkit-0.113-5.24.1.x86_64.rpm. Fresh installs of the vApp versions 9.1.x and 9.2.x. are not impacted by CVE-2021-4034. 
Product Affected Versions Updated Versions Link to Update
Unisphere for PowerMax Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.1.0.32 9.1.0.32

EEM: 9.1.0.861
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere for PowerMax Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Drivers & Downloads
Unisphere for PowerMax Virtual Appliance Versions before 9.2.3.11 9.2.3.11

EEM: 9.2.3.15
Unisphere for PowerMax Virtual Appliance Drivers & Downloads
Unisphere 360 Versions before 9.1.0.30 9.1.0.30 Unisphere 360 Drivers & Downloads
Unisphere 360 Versions before 9.2.3.4 9.2.3.4 Unisphere 360 Drivers & Downloads
Solutions Enabler Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.1.0.19 9.1.0.19

EEM: 9.1.0.861
Solutions Enabler Virtual Appliance Drivers & Downloads
Solutions Enabler Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Drivers & Downloads
Solutions Enabler Virtual Appliance Versions before 9.2.3.1 9.2.3.1

EEM: 9.2.3.15
Solutions Enabler Virtual Appliance Drivers & Downloads
VASA Provider Versions before 9.1.0.724 9.1.0.724 VASA Provider Drivers & Downloads
VASA Provider Versions before 9.2.3.10 9.2.3.10 VASA Provider Drivers & Downloads
PowerMax OS 5978 5978 Request OPT 596274 for Foxtail SR and Hickory SR
 


Note: Virtual Appliance (vApp) upgrade from 9.0.x to 9.1.x is impacted by CVE-2021-4034. Customers must upgrade the above deployment with the latest 2022 Q1 SR 9.1.0.32 ISO image. The latest SUSE patches are included in the latest ISO image: libpolkit0-0.113-5.24.1.x86_64.rpm and polkit-0.113-5.24.1.x86_64.rpm. Fresh installs of the vApp versions 9.1.x and 9.2.x. are not impacted by CVE-2021-4034. 

Revisiegeschiedenis

RevisionDateDescription
1.02022-03-23PowerMax Q1 2022 Quarterly Security Update
2.02022-04-22Added note to address CVE-2021-4034

Bevestigingen

CVE-2021-36339: Dell Technologies would like to thank Thorsten Tüllmann for reporting the Virtual Appliance privilege escalation vulnerability.
 

Verwante informatie

Getroffen producten

PowerMax, PowerMax 2000, PowerMax 8000, PowerMaxOS 5978, Product Security Information, Solutions Enabler, Solutions Enabler Series, Unisphere 360, Unisphere for VMAX, Unisphere for PowerMax, VASA Provider, VMAX, VMAX 200K, VMAX 450F
Artikeleigenschappen
Artikelnummer: 000197693
Artikeltype: Dell Security Advisory
Laatst aangepast: 06 jun. 2022
Vind antwoorden op uw vragen via andere Dell gebruikers
Support Services
Controleer of uw apparaat wordt gedekt door Support Services.