SB2022102726 - Multiple vulnerabilities in Dell PowerFlex Rack



SB2022102726 - Multiple vulnerabilities in Dell PowerFlex Rack

Published: October 27, 2022

Security Bulletin ID SB2022102726
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2020-0545)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in subsystem. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.

Note: This vulnerability affects the following versions of Intel CSME, TXE and SPS:

CSME:

  • 11.0 through 11.8.76
  • 11.20 through 11.22.76
  • 11.10 through 11.12.76
TXE:

  • 3.0 through 3.1.70
  • 4.0 through 4.0.20
SPS:

  • SPS_E5_04.00.00.000.0 through SPS_E5_04.01.04.379.0
  • SPS_SoC-X_04.00.00.000.0 through SPS_SoC-X_04.00.04.127.0
  • SPS_SoC-A_04.00.00.000.0 through SPS_SoC-A_04.00.04.210.0
  • SPS_E3_04.00.00.000.0 through SPS_E3_04.01.04.103.0
  • SPS_E3_04.08.00.000.0 through SPS_E3_04.08.04.065.0


2) Information disclosure (CVE-ID: CVE-2020-0548)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to cleanup errors. A local user can gain unauthorized access to sensitive information on the system.


3) Information disclosure (CVE-ID: CVE-2020-0549)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to cleanup errors in some data cache evictions. A local user can gain unauthorized access to sensitive information on the system.


4) Stored cross-site scripting (CVE-ID: CVE-2020-3955)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in ESXi Host Client. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.