High
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2021-36339 | The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts. A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance. Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226. Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity. |
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Third-party Component | CVEs | More information |
SUSE Linux Enterprise Server 12 SP5 | See SUSE Security Advisories. | See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories. SUSE-SU-2022:0030-1, SUSE-SU-2022:0189-1: CVE-2021-4034 polkit fixes, SUSE-SU-2021:4060-1, SUSE-SU-2021:4004-1, SUSE-SU-2021:3951-1, SUSE-SU-2021:3935-1, SUSE-SU-2021:3878-1, SUSE-SU-2021:3877-1, SUSE-SU-2021:3875-1, SUSE-SU-2021:3859-1, SUSE-SU-2021:3853-1, SUSE-SU-2021:3837-1, SUSE-SU-2021:3748-1, SUSE-SU-2021:3657-1, SUSE-SU-2021:3652-1, SUSE-SU-2021:3611-1, SUSE-SU-2021:3524-1, SUSE-SU-2021:3502-1, SUSE-SU-2021:3491-1, SUSE-SU-2021:3486-1, SUSE-SU-2021:3477-1, SUSE-SU-2021:3475-1, SUSE-SU-2021:3463-1, SUSE-SU-2021:3452-1, SUSE-SU-2021:3237-1, SUSE-SU-2021:3144-1, SUSE-SU-2021:2930-1, SUSE-SU-2021:2876-1, SUSE-SU-2021:2825-1, SUSE-SU-2021:2423-1, SUSE-SU-2021:1621-1, SUSE-SU-2021:0886-1, SUSE-SU-2021:0794-1, SUSE-SU-2021:0432-1, SUSE-SU-2021:0344-1, SUSE-SU-2020:3765-1, SUSE-SU-2020:3596-1, SUSE-SU-2020:3262-1, SUSE-SU-2020:3121-1, SUSE-SU-2020:2699-1, SUSE-SU-2020:2275-1, SUSE-SU-2020:1839-1, SUSE-SU-2020:1732-1, SUSE-SU-2020:1662-1, SUSE-SU-2020:1612-1, SUSE-SU-2020:1570-1, SUSE-SU-2020:1550-1, SUSE-SU-2020:1534-1, SUSE-SU-2020:1524-1, SUSE-SU-2020:1180-1, SUSE-SU-2020:0854-1, SUSE-SU-2020:0630-1, SUSE-SU-2020:0545-1, SUSE-SU-2020:0497-1, SUSE-SU-2020:0457-1, SUSE-SU-2020:0410-1, SUSE-SU-2020:0331-1, SUSE-SU-2020:0088-1, SUSE-SU-2019:3180-1, SUSE-SU-2019:3060-2, SUSE-SU-2019:2972-1, SUSE-SU-2019:2941-1, SUSE-SU-2019:2936-1, SUSE-SU-2019:2798-1, SUSE-SU-2019:2781-1, SUSE-SU-2019:2669-1, SUSE-SU-2019:2339-2, SUSE-SU-2019:2265-1, SUSE-SU-2019:2264-1, SUSE-SU-2019:2013-1, SUSE-SU-2019:1972-1, SUSE-SU-2019:1955-1, SUSE-SU-2019:1733-1, SUSE-SU-2019:1645-1, SUSE-SU-2019:1606-2, SUSE-SU-2019:1606-1, SUSE-SU-2019:1468-1, SUSE-SU-2019:1456-1, SUSE-SU-2019:1379-1, SUSE-SU-2019:1363-1, SUSE-SU-2019:1265-1, SUSE-SU-2019:1166-1, SUSE-SU-2019:1111-1, SUSE-SU-2019:1091-1, SUSE-SU-2019:1060-1, SUSE-SU-2019:0996-1, SUSE-SU-2019:0956-1, SUSE-SU-2019:0839-1, SUSE-SU-2019:0838-1, SUSE-SU-2019:0776-1, SUSE-SU-2019:0747-1, SUSE-SU-2019:0655-1, SUSE-SU-2019:0450-1, SUSE-SU-2019:0428-1, SUSE-SU-2019:0249-1, SUSE-SU-2019:0209-1, SUSE-SU-2019:0135-1, SUSE-SU-2018:4191-1, SUSE-SU-2018:4149-1, SUSE-SU-2018:3967-1, SUSE-SU-2018:3926-1, SUSE-SU-2018:3911-1, SUSE-SU-2018:3884-1, SUSE-SU-2018:3767-1, SUSE-SU-2018:3640-1, SUSE-SU-2018:3608-1, SUSE-SU-2018:3545-1, SUSE-SU-2018:3447-1, SUSE-SU-2018:3289-1, SUSE-SU-2018:3286-1, SUSE-SU-2018:3219-1, SUSE-SU-2018:3066-1, SUSE-SU-2018:2991-1, SUSE-SU-2018:2978-1, SUSE-SU-2018:2842-1, SUSE-SU-2018:2841-1, SUSE-SU-2018:2837-1, SUSE-SU-2018:2836-1, SUSE-SU-2018:2835-1, SUSE-SU-2018:2814-1, SUSE-SU-2018:2779-1, SUSE-SU-2018:2715-1, SUSE-SU-2018:2451-2, SUSE-SU-2018:2204-1, SUSE-SU-2018:2171-1, SUSE-SU-2018:2145-1, SUSE-SU-2018:2071-1, SUSE-SU-2018:2038-1, SUSE-SU-2018:1997-1, SUSE-SU-2018:1972-1, SUSE-SU-2018:1950-1, SUSE-SU-2018:1836-1, SUSE-SU-2018:1826-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:1401-1, SUSE-SU-2018:1398-1, SUSE-SU-2018:1373-1, SUSE-SU-2018:1327-1, SUSE-SU-2018:1288-1, SUSE-SU-2018:1195-1, SUSE-SU-2018:1180-1, SUSE-SU-2018:1074-1, SUSE-SU-2018:0926-1, SUSE-SU-2018:0878-1, SUSE-SU-2018:0858-1, SUSE-SU-2018:0769-1, SUSE-SU-2018:0673-1, SUSE-SU-2018:0662-1, SUSE-SU-2018:0650-1, SUSE-SU-2018:0546-1, SUSE-SU-2018:0510-1, SUSE-SU-2018:0373-1, SUSE-SU-2018:0337-1, SUSE-SU-2018:0299-1, SUSE-SU-2018:0295-1, SUSE-SU-2018:0284-1, SUSE-SU-2018:0260-1, SUSE-SU-2018:0217-1, SUSE-SU-2018:0200-1, SUSE-SU-2018:0193-1, SUSE-SU-2018:0181-1, SUSE-SU-2018:0173-1, SUSE-SU-2018:0135-1, SUSE-SU-2018:0123-1, SUSE-SU-2018:0122-1, SUSE-SU-2018:0120-1, SUSE-SU-2018:0073-1, SUSE-SU-2017:3441-1, SUSE-SU-2017:3214-1, SUSE-SU-2017:3092-1, SUSE-SU-2017:3048-1, SUSE-SU-2017:2947-1, SUSE-SU-2017:2871-2, SUSE-SU-2017:2854-1, SUSE-SU-2017:2831-1, SUSE-SU-2017:2569-1, SUSE-SU-2017:2381-1, SUSE-SU-2017:2344-1, SUSE-SU-2017:2318-1, SUSE-SU-2017:2299-1, SUSE-SU-2017:2264-1, SUSE-SU-2017:2174-1, SUSE-SU-2017:2129-1, SUSE-SU-2017:2117-1, SUSE-SU-2017:2075-1, SUSE-SU-2017:2031-1 |
Oracle | CVE-2021-22959, CVE-2022-21349, CVE-2022-21291, CVE-2022-21305, CVE-2022-21277, CVE-2022-21360, CVE-2022-21365, CVE-2022-21366, CVE-2022-21282, CVE-2022-21296, CVE-2022-21299, CVE-2022-21271, CVE-2022-21283, CVE-2022-21293, CVE-2022-21294, CVE-2022-21340, CVE-2022-21341, CVE-2022-21248 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Windows 10 | CVE-2021-22947, CVE-2021-36957, CVE-2021-36976, CVE-2021-38631, CVE-2021-38665, CVE-2021-38666, CVE-2021-41333, CVE-2021-41356, CVE-2021-41366, CVE-2021-41367, CVE-2021-41370, CVE-2021-41371, CVE-2021-41377, CVE-2021-41378, CVE-2021-41379, CVE-2021-42275, CVE-2021-42276, CVE-2021-42277, CVE-2021-42279, CVE-2021-42280, CVE-2021-42283, CVE-2021-42285, CVE-2021-42288, CVE-2021-43207, CVE-2021-43215, CVE-2021-43216, CVE-2021-43217, CVE-2021-43219, CVE-2021-43222, CVE-2021-43223, CVE-2021-43224, CVE-2021-43226, CVE-2021-43227, CVE-2021-43228, CVE-2021-43229, CVE-2021-43230, CVE-2021-43231, CVE-2021-43232, CVE-2021-43233, CVE-2021-43234, CVE-2021-43235, CVE-2021-43236, CVE-2021-43238, CVE-2021-43244, CVE-2021-43247, CVE-2021-43248, CVE-2021-43883, CVE-2021-43893, CVE-2022-21833, CVE-2022-21834, CVE-2022-21835, CVE-2022-21836, CVE-2022-21838, CVE-2022-21839, CVE-2022-21843, CVE-2022-21848, CVE-2022-21849, CVE-2022-21850, CVE-2022-21851, CVE-2022-21852, CVE-2022-21857, CVE-2022-21858, CVE-2022-21859, CVE-2022-21860, CVE-2022-21861, CVE-2022-21862, CVE-2022-21863, CVE-2022-21864, CVE-2022-21865, CVE-2022-21866, CVE-2022-21867, CVE-2022-21868, CVE-2022-21869, CVE-2022-21870, CVE-2022-21871, CVE-2022-21872, CVE-2022-21873, CVE-2022-21874, CVE-2022-21875, CVE-2022-21876, CVE-2022-21877, CVE-2022-21878, CVE-2022-21879, CVE-2022-21880, CVE-2022-21881, CVE-2022-21882, CVE-2022-21883, CVE-2022-21885, CVE-2022-21888, CVE-2022-21889, CVE-2022-21890, CVE-2022-21892, CVE-2022-21893, CVE-2022-21894, CVE-2022-21895, CVE-2022-21896, CVE-2022-21897, CVE-2022-21898, CVE-2022-21902, CVE-2022-21903, CVE-2022-21904, CVE-2022-21906, CVE-2022-21907, CVE-2022-21908, CVE-2022-21912, CVE-2022-21913, CVE-2022-21914, CVE-2022-21915, CVE-2022-21916, CVE-2022-21918, CVE-2022-21919, CVE-2022-21920, CVE-2022-21922, CVE-2022-21924, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2021-36339 | The Dell EMC Virtual Appliances prior to 9.2.3.11 contain undocumented user accounts. A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance. Note: CVE-2021-36339 was not fully addressed in the Dell Virtual Appliances versions before 9.2.2.2 as previously communicated on Dell KB DSA-2021-226. Dell highly recommends all users upgrade Dell virtual Appliances to version 9.2.3.11 at their earliest opportunity. |
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Third-party Component | CVEs | More information |
SUSE Linux Enterprise Server 12 SP5 | See SUSE Security Advisories. | See https://www.suse.com/support/update/ for more information on the following SUSE Update Advisories. SUSE-SU-2022:0030-1, SUSE-SU-2022:0189-1: CVE-2021-4034 polkit fixes, SUSE-SU-2021:4060-1, SUSE-SU-2021:4004-1, SUSE-SU-2021:3951-1, SUSE-SU-2021:3935-1, SUSE-SU-2021:3878-1, SUSE-SU-2021:3877-1, SUSE-SU-2021:3875-1, SUSE-SU-2021:3859-1, SUSE-SU-2021:3853-1, SUSE-SU-2021:3837-1, SUSE-SU-2021:3748-1, SUSE-SU-2021:3657-1, SUSE-SU-2021:3652-1, SUSE-SU-2021:3611-1, SUSE-SU-2021:3524-1, SUSE-SU-2021:3502-1, SUSE-SU-2021:3491-1, SUSE-SU-2021:3486-1, SUSE-SU-2021:3477-1, SUSE-SU-2021:3475-1, SUSE-SU-2021:3463-1, SUSE-SU-2021:3452-1, SUSE-SU-2021:3237-1, SUSE-SU-2021:3144-1, SUSE-SU-2021:2930-1, SUSE-SU-2021:2876-1, SUSE-SU-2021:2825-1, SUSE-SU-2021:2423-1, SUSE-SU-2021:1621-1, SUSE-SU-2021:0886-1, SUSE-SU-2021:0794-1, SUSE-SU-2021:0432-1, SUSE-SU-2021:0344-1, SUSE-SU-2020:3765-1, SUSE-SU-2020:3596-1, SUSE-SU-2020:3262-1, SUSE-SU-2020:3121-1, SUSE-SU-2020:2699-1, SUSE-SU-2020:2275-1, SUSE-SU-2020:1839-1, SUSE-SU-2020:1732-1, SUSE-SU-2020:1662-1, SUSE-SU-2020:1612-1, SUSE-SU-2020:1570-1, SUSE-SU-2020:1550-1, SUSE-SU-2020:1534-1, SUSE-SU-2020:1524-1, SUSE-SU-2020:1180-1, SUSE-SU-2020:0854-1, SUSE-SU-2020:0630-1, SUSE-SU-2020:0545-1, SUSE-SU-2020:0497-1, SUSE-SU-2020:0457-1, SUSE-SU-2020:0410-1, SUSE-SU-2020:0331-1, SUSE-SU-2020:0088-1, SUSE-SU-2019:3180-1, SUSE-SU-2019:3060-2, SUSE-SU-2019:2972-1, SUSE-SU-2019:2941-1, SUSE-SU-2019:2936-1, SUSE-SU-2019:2798-1, SUSE-SU-2019:2781-1, SUSE-SU-2019:2669-1, SUSE-SU-2019:2339-2, SUSE-SU-2019:2265-1, SUSE-SU-2019:2264-1, SUSE-SU-2019:2013-1, SUSE-SU-2019:1972-1, SUSE-SU-2019:1955-1, SUSE-SU-2019:1733-1, SUSE-SU-2019:1645-1, SUSE-SU-2019:1606-2, SUSE-SU-2019:1606-1, SUSE-SU-2019:1468-1, SUSE-SU-2019:1456-1, SUSE-SU-2019:1379-1, SUSE-SU-2019:1363-1, SUSE-SU-2019:1265-1, SUSE-SU-2019:1166-1, SUSE-SU-2019:1111-1, SUSE-SU-2019:1091-1, SUSE-SU-2019:1060-1, SUSE-SU-2019:0996-1, SUSE-SU-2019:0956-1, SUSE-SU-2019:0839-1, SUSE-SU-2019:0838-1, SUSE-SU-2019:0776-1, SUSE-SU-2019:0747-1, SUSE-SU-2019:0655-1, SUSE-SU-2019:0450-1, SUSE-SU-2019:0428-1, SUSE-SU-2019:0249-1, SUSE-SU-2019:0209-1, SUSE-SU-2019:0135-1, SUSE-SU-2018:4191-1, SUSE-SU-2018:4149-1, SUSE-SU-2018:3967-1, SUSE-SU-2018:3926-1, SUSE-SU-2018:3911-1, SUSE-SU-2018:3884-1, SUSE-SU-2018:3767-1, SUSE-SU-2018:3640-1, SUSE-SU-2018:3608-1, SUSE-SU-2018:3545-1, SUSE-SU-2018:3447-1, SUSE-SU-2018:3289-1, SUSE-SU-2018:3286-1, SUSE-SU-2018:3219-1, SUSE-SU-2018:3066-1, SUSE-SU-2018:2991-1, SUSE-SU-2018:2978-1, SUSE-SU-2018:2842-1, SUSE-SU-2018:2841-1, SUSE-SU-2018:2837-1, SUSE-SU-2018:2836-1, SUSE-SU-2018:2835-1, SUSE-SU-2018:2814-1, SUSE-SU-2018:2779-1, SUSE-SU-2018:2715-1, SUSE-SU-2018:2451-2, SUSE-SU-2018:2204-1, SUSE-SU-2018:2171-1, SUSE-SU-2018:2145-1, SUSE-SU-2018:2071-1, SUSE-SU-2018:2038-1, SUSE-SU-2018:1997-1, SUSE-SU-2018:1972-1, SUSE-SU-2018:1950-1, SUSE-SU-2018:1836-1, SUSE-SU-2018:1826-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:1401-1, SUSE-SU-2018:1398-1, SUSE-SU-2018:1373-1, SUSE-SU-2018:1327-1, SUSE-SU-2018:1288-1, SUSE-SU-2018:1195-1, SUSE-SU-2018:1180-1, SUSE-SU-2018:1074-1, SUSE-SU-2018:0926-1, SUSE-SU-2018:0878-1, SUSE-SU-2018:0858-1, SUSE-SU-2018:0769-1, SUSE-SU-2018:0673-1, SUSE-SU-2018:0662-1, SUSE-SU-2018:0650-1, SUSE-SU-2018:0546-1, SUSE-SU-2018:0510-1, SUSE-SU-2018:0373-1, SUSE-SU-2018:0337-1, SUSE-SU-2018:0299-1, SUSE-SU-2018:0295-1, SUSE-SU-2018:0284-1, SUSE-SU-2018:0260-1, SUSE-SU-2018:0217-1, SUSE-SU-2018:0200-1, SUSE-SU-2018:0193-1, SUSE-SU-2018:0181-1, SUSE-SU-2018:0173-1, SUSE-SU-2018:0135-1, SUSE-SU-2018:0123-1, SUSE-SU-2018:0122-1, SUSE-SU-2018:0120-1, SUSE-SU-2018:0073-1, SUSE-SU-2017:3441-1, SUSE-SU-2017:3214-1, SUSE-SU-2017:3092-1, SUSE-SU-2017:3048-1, SUSE-SU-2017:2947-1, SUSE-SU-2017:2871-2, SUSE-SU-2017:2854-1, SUSE-SU-2017:2831-1, SUSE-SU-2017:2569-1, SUSE-SU-2017:2381-1, SUSE-SU-2017:2344-1, SUSE-SU-2017:2318-1, SUSE-SU-2017:2299-1, SUSE-SU-2017:2264-1, SUSE-SU-2017:2174-1, SUSE-SU-2017:2129-1, SUSE-SU-2017:2117-1, SUSE-SU-2017:2075-1, SUSE-SU-2017:2031-1 |
Oracle | CVE-2021-22959, CVE-2022-21349, CVE-2022-21291, CVE-2022-21305, CVE-2022-21277, CVE-2022-21360, CVE-2022-21365, CVE-2022-21366, CVE-2022-21282, CVE-2022-21296, CVE-2022-21299, CVE-2022-21271, CVE-2022-21283, CVE-2022-21293, CVE-2022-21294, CVE-2022-21340, CVE-2022-21341, CVE-2022-21248 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Windows 10 | CVE-2021-22947, CVE-2021-36957, CVE-2021-36976, CVE-2021-38631, CVE-2021-38665, CVE-2021-38666, CVE-2021-41333, CVE-2021-41356, CVE-2021-41366, CVE-2021-41367, CVE-2021-41370, CVE-2021-41371, CVE-2021-41377, CVE-2021-41378, CVE-2021-41379, CVE-2021-42275, CVE-2021-42276, CVE-2021-42277, CVE-2021-42279, CVE-2021-42280, CVE-2021-42283, CVE-2021-42285, CVE-2021-42288, CVE-2021-43207, CVE-2021-43215, CVE-2021-43216, CVE-2021-43217, CVE-2021-43219, CVE-2021-43222, CVE-2021-43223, CVE-2021-43224, CVE-2021-43226, CVE-2021-43227, CVE-2021-43228, CVE-2021-43229, CVE-2021-43230, CVE-2021-43231, CVE-2021-43232, CVE-2021-43233, CVE-2021-43234, CVE-2021-43235, CVE-2021-43236, CVE-2021-43238, CVE-2021-43244, CVE-2021-43247, CVE-2021-43248, CVE-2021-43883, CVE-2021-43893, CVE-2022-21833, CVE-2022-21834, CVE-2022-21835, CVE-2022-21836, CVE-2022-21838, CVE-2022-21839, CVE-2022-21843, CVE-2022-21848, CVE-2022-21849, CVE-2022-21850, CVE-2022-21851, CVE-2022-21852, CVE-2022-21857, CVE-2022-21858, CVE-2022-21859, CVE-2022-21860, CVE-2022-21861, CVE-2022-21862, CVE-2022-21863, CVE-2022-21864, CVE-2022-21865, CVE-2022-21866, CVE-2022-21867, CVE-2022-21868, CVE-2022-21869, CVE-2022-21870, CVE-2022-21871, CVE-2022-21872, CVE-2022-21873, CVE-2022-21874, CVE-2022-21875, CVE-2022-21876, CVE-2022-21877, CVE-2022-21878, CVE-2022-21879, CVE-2022-21880, CVE-2022-21881, CVE-2022-21882, CVE-2022-21883, CVE-2022-21885, CVE-2022-21888, CVE-2022-21889, CVE-2022-21890, CVE-2022-21892, CVE-2022-21893, CVE-2022-21894, CVE-2022-21895, CVE-2022-21896, CVE-2022-21897, CVE-2022-21898, CVE-2022-21902, CVE-2022-21903, CVE-2022-21904, CVE-2022-21906, CVE-2022-21907, CVE-2022-21908, CVE-2022-21912, CVE-2022-21913, CVE-2022-21914, CVE-2022-21915, CVE-2022-21916, CVE-2022-21918, CVE-2022-21919, CVE-2022-21920, CVE-2022-21922, CVE-2022-21924, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963 |
See NVD (http://nvd.nist.gov/) for individual scores for each CVE |
Product | Affected Versions | Updated Versions | Link to Update |
Unisphere for PowerMax | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere for PowerMax | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere 360 | Versions before 9.1.0.30 | 9.1.0.30 | Unisphere 360 Drivers & Downloads |
Unisphere 360 | Versions before 9.2.3.4 | 9.2.3.4 | Unisphere 360 Drivers & Downloads |
Solutions Enabler | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
Solutions Enabler | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
VASA Provider | Versions before 9.1.0.724 | 9.1.0.724 | VASA Provider Drivers & Downloads |
VASA Provider | Versions before 9.2.3.10 | 9.2.3.10 | VASA Provider Drivers & Downloads |
PowerMax OS | 5978 | 5978 | Request OPT 596274 for Foxtail SR and Hickory SR |
Product | Affected Versions | Updated Versions | Link to Update |
Unisphere for PowerMax | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.1.0.32 | 9.1.0.32 EEM: 9.1.0.861 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere for PowerMax | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Drivers & Downloads |
Unisphere for PowerMax Virtual Appliance | Versions before 9.2.3.11 | 9.2.3.11 EEM: 9.2.3.15 |
Unisphere for PowerMax Virtual Appliance Drivers & Downloads |
Unisphere 360 | Versions before 9.1.0.30 | 9.1.0.30 | Unisphere 360 Drivers & Downloads |
Unisphere 360 | Versions before 9.2.3.4 | 9.2.3.4 | Unisphere 360 Drivers & Downloads |
Solutions Enabler | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.1.0.19 | 9.1.0.19 EEM: 9.1.0.861 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
Solutions Enabler | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Drivers & Downloads |
Solutions Enabler Virtual Appliance | Versions before 9.2.3.1 | 9.2.3.1 EEM: 9.2.3.15 |
Solutions Enabler Virtual Appliance Drivers & Downloads |
VASA Provider | Versions before 9.1.0.724 | 9.1.0.724 | VASA Provider Drivers & Downloads |
VASA Provider | Versions before 9.2.3.10 | 9.2.3.10 | VASA Provider Drivers & Downloads |
PowerMax OS | 5978 | 5978 | Request OPT 596274 for Foxtail SR and Hickory SR |
Revision | Date | Description |
1.0 | 2022-03-23 | PowerMax Q1 2022 Quarterly Security Update |
2.0 | 2022-04-22 | Added note to address CVE-2021-4034 |
CVE-2021-36339: Dell Technologies would like to thank Thorsten Tüllmann for reporting the Virtual Appliance privilege escalation vulnerability.