Multiple vulnerabilities in Dell Networking Products



Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2023-28746
CVE-2023-32282
CVE-2023-22655
CWE-ID CWE-200
CWE-362
CWE-254
Exploitation vector Local
Public exploit N/A
Vulnerable software
PowerSwitch N3200-ON Series
Hardware solutions / Firmware

PowerSwitch N2200-ON Series
Hardware solutions / Firmware

PowerSwitch E3200-ON Series
Hardware solutions / Firmware

PowerSwitch S5448F-ON
Hardware solutions / Firmware

PowerSwitch Z9264F-ON
Hardware solutions / Firmware

PowerSwitch Z9432F-ON
Hardware solutions / Firmware

Dell SD-WAN EDGE610/610-LTE
Hardware solutions / Firmware

Dell SD-WAN EDGE620/640/680
Hardware solutions / Firmware

Dell EMC Networking VEP1425/1445/1485
Hardware solutions / Firmware

PowerSwitch Z9664F-ON
Other software / Other software solutions

Vendor Dell

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Information disclosure

EUVDB-ID: #VU87457

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-28746

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to information exposure through microarchitectural state after transient execution from some register files for some Intel Atom Processors. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's website

Vulnerable software versions

PowerSwitch N3200-ON Series: before 3.45.5.1-31

PowerSwitch N2200-ON Series: before 3.45.5.1-31

PowerSwitch E3200-ON Series: before 3.57.5.1-5

PowerSwitch S5448F-ON: before 3.52.5.1-12

PowerSwitch Z9264F-ON: before 3.42.5.1-21

PowerSwitch Z9432F-ON: before 3.51.5.1-21

Dell SD-WAN EDGE610/610-LTE: before 3.43.0.9-24

Dell SD-WAN EDGE620/640/680: before 3.50.0.9-21

Dell EMC Networking VEP1425/1445/1485: before 2.6

PowerSwitch Z9664F-ON: before 3.54.5.1-9

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000321646/dsa-2025-197-security-update-for-dell-networking-products-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Race condition

EUVDB-ID: #VU87489

Risk: Low

CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-32282

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in BIOS firmware. A local privileged user can exploit the race and escalate privileges on the system.

Mitigation

Install updates from vendor's website

Vulnerable software versions

PowerSwitch Z9664F-ON: before 3.54.5.1-9

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000321646/dsa-2025-197-security-update-for-dell-networking-products-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Security features bypass

EUVDB-ID: #VU87459

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-22655

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a protection mechanism failure in some 3rd and 4th Generation Intel Xeon Processors when using Intel SGX or Intel TDX. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website

Vulnerable software versions

PowerSwitch Z9664F-ON: before 3.54.5.1-9

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000321646/dsa-2025-197-security-update-for-dell-networking-products-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###