Headline
CVE-2022-22549: DSA-2022-002: Dell EMC PowerScale OneFS Security Update for Multiple Vulnerabilities
Dell PowerScale OneFS, 8.2.x-9.3.x, contains a Improper Certificate Validation. A unauthenticated remote attacker could potentially exploit this vulnerability, leading to a man-in-the-middle capture of administrative credentials.
Vaikutus
High
Tiedot
Proprietary Code CVEs
Description
CVSS Base Score
CVSS Vector String
CVE-2022-22561
Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contain an improper restriction of excessive authentication attempts. An unauthenticated remote attacker may potentially exploit this vulnerability, leading to compromised accounts.
8.1
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
CVE-2022-22549
Dell PowerScale OneFS, 8.2.x-9.3.x, contain an Improper Certificate Validation. A unauthenticated remote attacker may potentially exploit this vulnerability, leading to a man-in-the-middle capture of administrative credentials.
7.5
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-22559
Dell PowerScale OneFS, version 9.3.0, contains a use of a broken or risky cryptographic algorithm. An unprivileged network attacker may exploit this vulnerability, leading to the potential for information disclosure.
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-22562
Dell PowerScale OneFS, versions 8.2.0-9.2.1.x, contain an improper handling of missing values vulnerability. An unauthenticated network attacker may potentially exploit this denial-of-service vulnerability.
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-22560
Dell EMC PowerScale OneFS versions 8.1.x-9.2.1.x contain hard coded credentials. This may allow a local user with knowledge of the credentials to login as the admin user to the backend ethernet switch of a PowerScale cluster. The attacker may exploit this vulnerability to take the switch offline.
7.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CVE-2022-22550
Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain a password disclosure vulnerability. An unprivileged local attacker may potentially exploit this vulnerability, leading to account takeover.
6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-22565
Dell PowerScale OneFS, versions 9.0.0-9.3.0 contain an improper authorization of index containing sensitive information. An authenticated and privileged user may potentially exploit this vulnerability, leading to disclosure or modification of sensitive data.
4.7
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Third-party Component
CVEs
More information
GNU gettext
CVE-2018-18751
https://nvd.nist.gov/vuln/detail/CVE-2018-18751
https://www.gnu.org/software/gettext/
OpenSSL
CVE-2021-3712
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://www.openssl.org/news/secadv/20210824.txt
Apache
Multiple
https://httpd.apache.org/security/vulnerabilities_24.html
Proprietary Code CVEs
Description
CVSS Base Score
CVSS Vector String
CVE-2022-22561
Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contain an improper restriction of excessive authentication attempts. An unauthenticated remote attacker may potentially exploit this vulnerability, leading to compromised accounts.
8.1
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
CVE-2022-22549
Dell PowerScale OneFS, 8.2.x-9.3.x, contain an Improper Certificate Validation. A unauthenticated remote attacker may potentially exploit this vulnerability, leading to a man-in-the-middle capture of administrative credentials.
7.5
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-22559
Dell PowerScale OneFS, version 9.3.0, contains a use of a broken or risky cryptographic algorithm. An unprivileged network attacker may exploit this vulnerability, leading to the potential for information disclosure.
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-22562
Dell PowerScale OneFS, versions 8.2.0-9.2.1.x, contain an improper handling of missing values vulnerability. An unauthenticated network attacker may potentially exploit this denial-of-service vulnerability.
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-22560
Dell EMC PowerScale OneFS versions 8.1.x-9.2.1.x contain hard coded credentials. This may allow a local user with knowledge of the credentials to login as the admin user to the backend ethernet switch of a PowerScale cluster. The attacker may exploit this vulnerability to take the switch offline.
7.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CVE-2022-22550
Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain a password disclosure vulnerability. An unprivileged local attacker may potentially exploit this vulnerability, leading to account takeover.
6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-22565
Dell PowerScale OneFS, versions 9.0.0-9.3.0 contain an improper authorization of index containing sensitive information. An authenticated and privileged user may potentially exploit this vulnerability, leading to disclosure or modification of sensitive data.
4.7
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Third-party Component
CVEs
More information
GNU gettext
CVE-2018-18751
https://nvd.nist.gov/vuln/detail/CVE-2018-18751
https://www.gnu.org/software/gettext/
OpenSSL
CVE-2021-3712
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://www.openssl.org/news/secadv/20210824.txt
Apache
Multiple
https://httpd.apache.org/security/vulnerabilities_24.html
Dell Technologies suosittelee, että kaikki asiakkaat ottavat huomioon sekä CVSS-peruspistemäärän että kaikki asiaankuuluvat väliaikaiset ja ympäristöön liittyvät pisteet, jotka voivat vaikuttaa tietyn tietoturvahaavoittuvuuden mahdolliseen vakavuuteen.
Tuotteet, joihin asia vaikuttaa ja tilanteen korjaaminen
CVEs Addressed
Affected Versions
Updated Versions
Link to Update
CVE-2022-22561
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
PowerScale OneFS Downloads Area
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2022-22549
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2022-22559
n/a
Upgrade your version of OneFS
9.3.0.x
Download and install the latest RUP
CVE-2022-22562
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x and 9.2.1.x
Download and install the latest RUP
CVE-2022-22560
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x and 9.2.1.x
Download and install the latest RUP
CVE-2022-22550
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2018-18751
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2021-3712
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
Apache: Multiple
8.2.x, 9.0.0.x, 9.1.1.x, 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, 9.3.0.x
Download and install the latest RUP
CVE-2022-22565
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
CVEs Addressed
Affected Versions
Updated Versions
Link to Update
CVE-2022-22561
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
PowerScale OneFS Downloads Area
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2022-22549
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2022-22559
n/a
Upgrade your version of OneFS
9.3.0.x
Download and install the latest RUP
CVE-2022-22562
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x and 9.2.1.x
Download and install the latest RUP
CVE-2022-22560
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x and 9.2.1.x
Download and install the latest RUP
CVE-2022-22550
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2018-18751
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
CVE-2021-3712
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
Apache: Multiple
8.2.x, 9.0.0.x, 9.1.1.x, 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, 9.3.0.x
Download and install the latest RUP
CVE-2022-22565
8.2.x, 9.0.0.x, 9.1.1.x, and 9.2.0.x
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x
Download and install the latest RUP
Note: The table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
Versiohistoria
Revision
Date
Description
1.0
2022-01-31
Initial Release
Asiaan liittyvät tiedot
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
31 tammik. 2022
Related news
Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.
An issue in Zimbra Collaboration ZCS v.8.8.15 and v.9.0 allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
A vulnerability in the ArubaOS web management interface could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Gentoo Linux Security Advisory 202209-2 - Multiple vulnerabilities have been discovered in IBM Spectrum Protect, the worst of which could result in arbitrary code execution. Versions less than 8.1.13.3 are affected.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data t...
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL termin...