Headline
CVE-2022-23161: DSA-2022-024: Dell EMC PowerScale OneFS Security Update for Multiple Vulnerabilities
Dell PowerScale OneFS versions 8.2.x - 9.3.0.x contain a denial-of-service vulnerability in SmartConnect. An unprivileged network attacker may potentially exploit this vulnerability, leading to denial-of-service.
Vaikutus
Critical
Overview
Proprietary Code CVEs
Description
CVSS Base Score
CVSS Vector String
CVE-2022-24411
Dell PowerScale OneFS 8.2.2 and later contain an elevation of privilege vulnerability. A local attacker with ISI_PRIV_LOGIN_SSH and/or ISI_PRIV_LOGIN_CONSOLE may potentially exploit this vulnerability, leading to elevation of privilege. This may potentially allow users to circumvent PowerScale Compliance Mode guarantees.
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-24412
Dell EMC PowerScale OneFS 8.2.x - 9.3.0.x contain an improper handling of value vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability, leading to denial-of-service.
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-23161
Dell PowerScale OneFS versions 8.2.x - 9.3.0.x contain a denial-of-service vulnerability in SmartConnect. An unprivileged network attacker may potentially exploit this vulnerability, leading to denial-of-service.
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-23160
Dell PowerScale OneFS 8.2.x - 9.3.0 contain an Improper Handling of Insufficient Permissions vulnerability. An remote malicious user may potentially exploit this vulnerability, leading to gaining write permissions on read-only files.
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CVE-2022-23159
Dell PowerScale OneFS 8.2.x - 9.3.0.x contain a missing release of memory after effective lifetime vulnerability. An authenticated user with ISI_PRIV_LOGIN_SSH and/or ISI_PRIV_LOGIN_CONSOLE and ISI_PRIV_AUTH_PROVIDERS privileges may potentially exploit this vulnerability, leading to a Denial-Of-Service. This can also impact a cluster in Compliance mode. Dell recommends to update at the earliest opportunity.
4.8
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
CVE-2022-23163
Dell PowerScale OneFS 8.2.x - 9.3.0.x contain a denial of service vulnerability. A local attacker with minimal privileges may potentially exploit this vulnerability, leading to denial of service/data unavailability.
4.7
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-24413
Dell PowerScale OneFS 8.2.2-9.3.x contain a time-of-check-to-time-of-use vulnerability. A local user with access to the filesystem may potentially exploit this vulnerability, leading to data loss.
4.4
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Third-Party Component
CVE
More information
Apache Portable Runtime
CVE-2017-12613
CVE-2021-35940
Dell Technologies suosittelee, että kaikki asiakkaat ottavat huomioon sekä CVSS-peruspistemäärän että kaikki asiaankuuluvat väliaikaiset ja ympäristöön liittyvät pisteet, jotka voivat vaikuttaa tietyn tietoturvahaavoittuvuuden mahdolliseen vakavuuteen.
Tuotteet, joihin asia vaikuttaa ja tilanteen korjaaminen
CVEs Addressed
Affected Versions
Updated Versions
Link to Update
CVE-2022-24411
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
PowerScale OneFS Downloads Area
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-24412
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23161
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2017-12613
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23160
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23159
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23163
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-24413
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVEs Addressed
Affected Versions
Updated Versions
Link to Update
CVE-2022-24411
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
PowerScale OneFS Downloads Area
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-24412
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23161
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2017-12613
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23160
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23159
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-23163
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
CVE-2022-24413
8.2.2, 9.0.0, 9.1.1.x, and 9.2.0.x.
Upgrade your version of OneFS
9.1.0.x, 9.2.1.x, and 9.3.0.x.
Download and install the latest RUP
Keinoja ongelman kiertämiseen tai lieventämiseen
CVEs addressed
Workaround or Mitigation
CVE-2022-24411
none
CVE-2022-24412
Disable netbios support if enabled (default setting: disabled):
- Open an SSH connection on any node in the cluster and log on using the “root” account.
- Run the following command:
#isi smb settings global modify --support-netbios no
- To verify that the service is disabled, run the following command:
#isi smb settings global view | grep NetBIOS
If the service is disabled, the following output is displayed:
#Support NetBIOS: No
CVE-2022-23161
Configure a valid FQDN in the SmartConnect service name field for every SmartConnect subnet on the cluster:
#isi network subnets modify <subnet> --sc-service-name cluster-sc.example.com
CVE-2017-12613
none
CVE-2022-23160
Configure SMB share permissions of any SyncIQ target directory to prevent writes.
CVE-2022-23159
none
CVE-2022-23163
none
CVE-2022-24413
none
Versiohistoria
Revision
Date
Description
1.0
2022-03-03
Initial
1.1
2022-03-04
Corrected Impact
Asiaan liittyvät tiedot
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
12 heinäk. 2022
Related news
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue.