Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-22549: DSA-2022-002: Dell EMC PowerScale OneFS Security Update for Multiple Vulnerabilities

Dell PowerScale OneFS, 8.2.x-9.3.x, contains a Improper Certificate Validation. A unauthenticated remote attacker could potentially exploit this vulnerability, leading to a man-in-the-middle capture of administrative credentials.

CVE
#vulnerability#dos#apache#hard_coded_credentials#auth#dell#ssl

Vaikutus

High

Tiedot

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2022-22561

Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contain an improper restriction of excessive authentication attempts. An unauthenticated remote attacker may potentially exploit this vulnerability, leading to compromised accounts.

8.1

CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

CVE-2022-22549

Dell PowerScale OneFS, 8.2.x-9.3.x, contain an Improper Certificate Validation. A unauthenticated remote attacker may potentially exploit this vulnerability, leading to a man-in-the-middle capture of administrative credentials.

7.5

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-22559

Dell PowerScale OneFS, version 9.3.0, contains a use of a broken or risky cryptographic algorithm. An unprivileged network attacker may exploit this vulnerability, leading to the potential for information disclosure.

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2022-22562

Dell PowerScale OneFS, versions 8.2.0-9.2.1.x, contain an improper handling of missing values vulnerability. An unauthenticated network attacker may potentially exploit this denial-of-service vulnerability.

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-22560

Dell EMC PowerScale OneFS versions 8.1.x-9.2.1.x contain hard coded credentials. This may allow a local user with knowledge of the credentials to login as the admin user to the backend ethernet switch of a PowerScale cluster. The attacker may exploit this vulnerability to take the switch offline.

7.1

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

CVE-2022-22550

Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain a password disclosure vulnerability. An unprivileged local attacker may potentially exploit this vulnerability, leading to account takeover.

6.7

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2022-22565

Dell PowerScale OneFS, versions 9.0.0-9.3.0 contain an improper authorization of index containing sensitive information. An authenticated and privileged user may potentially exploit this vulnerability, leading to disclosure or modification of sensitive data.

4.7

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Third-party Component

CVEs

More information

GNU gettext

CVE-2018-18751

https://nvd.nist.gov/vuln/detail/CVE-2018-18751
https://www.gnu.org/software/gettext/

OpenSSL

CVE-2021-3712

https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://www.openssl.org/news/secadv/20210824.txt

Apache

Multiple

https://httpd.apache.org/security/vulnerabilities_24.html

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2022-22561

Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contain an improper restriction of excessive authentication attempts. An unauthenticated remote attacker may potentially exploit this vulnerability, leading to compromised accounts.

8.1

CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

CVE-2022-22549

Dell PowerScale OneFS, 8.2.x-9.3.x, contain an Improper Certificate Validation. A unauthenticated remote attacker may potentially exploit this vulnerability, leading to a man-in-the-middle capture of administrative credentials.

7.5

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-22559

Dell PowerScale OneFS, version 9.3.0, contains a use of a broken or risky cryptographic algorithm. An unprivileged network attacker may exploit this vulnerability, leading to the potential for information disclosure.

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2022-22562

Dell PowerScale OneFS, versions 8.2.0-9.2.1.x, contain an improper handling of missing values vulnerability. An unauthenticated network attacker may potentially exploit this denial-of-service vulnerability.

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-22560

Dell EMC PowerScale OneFS versions 8.1.x-9.2.1.x contain hard coded credentials. This may allow a local user with knowledge of the credentials to login as the admin user to the backend ethernet switch of a PowerScale cluster. The attacker may exploit this vulnerability to take the switch offline.

7.1

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

CVE-2022-22550

Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain a password disclosure vulnerability. An unprivileged local attacker may potentially exploit this vulnerability, leading to account takeover.

6.7

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2022-22565

Dell PowerScale OneFS, versions 9.0.0-9.3.0 contain an improper authorization of index containing sensitive information. An authenticated and privileged user may potentially exploit this vulnerability, leading to disclosure or modification of sensitive data.

4.7

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Third-party Component

CVEs

More information

GNU gettext

CVE-2018-18751

https://nvd.nist.gov/vuln/detail/CVE-2018-18751
https://www.gnu.org/software/gettext/

OpenSSL

CVE-2021-3712

https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://www.openssl.org/news/secadv/20210824.txt

Apache

Multiple

https://httpd.apache.org/security/vulnerabilities_24.html

Dell Technologies suosittelee, että kaikki asiakkaat ottavat huomioon sekä CVSS-peruspistemäärän että kaikki asiaankuuluvat väliaikaiset ja ympäristöön liittyvät pisteet, jotka voivat vaikuttaa tietyn tietoturvahaavoittuvuuden mahdolliseen vakavuuteen.

Tuotteet, joihin asia vaikuttaa ja tilanteen korjaaminen

CVEs Addressed

Affected Versions

Updated Versions

Link to Update

CVE-2022-22561

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

PowerScale OneFS Downloads Area

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2022-22549

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2022-22559

n/a

Upgrade your version of OneFS

9.3.0.x

Download and install the latest RUP

CVE-2022-22562

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x and 9.2.1.x

Download and install the latest RUP

CVE-2022-22560

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x and 9.2.1.x

Download and install the latest RUP

CVE-2022-22550

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2018-18751

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2021-3712

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

Apache: Multiple

8.2.x, 9.0.0.x, 9.1.1.x, 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, 9.3.0.x

Download and install the latest RUP

CVE-2022-22565

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.

CVEs Addressed

Affected Versions

Updated Versions

Link to Update

CVE-2022-22561

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

PowerScale OneFS Downloads Area

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2022-22549

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2022-22559

n/a

Upgrade your version of OneFS

9.3.0.x

Download and install the latest RUP

CVE-2022-22562

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x and 9.2.1.x

Download and install the latest RUP

CVE-2022-22560

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x and 9.2.1.x

Download and install the latest RUP

CVE-2022-22550

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2018-18751

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

CVE-2021-3712

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

Apache: Multiple

8.2.x, 9.0.0.x, 9.1.1.x, 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, 9.3.0.x

Download and install the latest RUP

CVE-2022-22565

8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x

Upgrade your version of OneFS

9.1.0.x, 9.2.1.x, and 9.3.0.x

Download and install the latest RUP

Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.

Versiohistoria

Revision

Date

Description

1.0

2022-01-31

Initial Release

Asiaan liittyvät tiedot

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide

31 tammik. 2022

Related news

CVE-2023-37875: Wing FTP Server History

Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

CVE-2023-22778

A vulnerability in the ArubaOS web management interface could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

Gentoo Linux Security Advisory 202209-02

Gentoo Linux Security Advisory 202209-2 - Multiple vulnerabilities have been discovered in IBM Spectrum Protect, the worst of which could result in arbitrary code execution. Versions less than 8.1.13.3 are affected.

CVE-2022-29286: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.

CVE-2022-27930: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.

CVE-2022-26656: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.

CVE-2022-27932: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.

CVE-2022-27934: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.

CVE-2022-27933: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.

CVE-2021-41003

Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.

CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data t...

CVE-2021-3712

ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL termin...

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907