Lucene search

K
cve[email protected]CVE-2021-36315
HistoryNov 12, 2021 - 11:15 p.m.

CVE-2021-36315

2021-11-1223:15:08
web.nvd.nist.gov
23
cve-2021-36315
dell emc
powerscale
nodes
hardware design flaw
local unauthenticated user
privilege escalation
compliance mode
critical vulnerability

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.3%

Dell EMC PowerScale Nodes contain a hardware design flaw. This may allow a local unauthenticated user to escalate privileges. This also affects Compliance mode and for Compliance mode clusters, is a critical vulnerability. Dell EMC recommends applying the workaround at your earliest opportunity.

Affected configurations

NVD
Node
dellemc_powerscale_nodes_a100_firmwareMatch-
AND
dellemc_powerscale_nodes_a100Match-
Node
dellemc_powerscale_nodes_s210_firmwareMatch-
AND
dellemc_powerscale_nodes_s210Match-
Node
dellemc_powerscale_nodes_x410_firmwareMatch-
AND
dellemc_powerscale_nodes_x410Match-
Node
dellemc_powerscale_nodes_h400_firmwareMatch-
AND
dellemc_powerscale_nodes_h400Match-
Node
dellemc_powerscale_nodes_x210_firmwareMatch-
AND
dellemc_powerscale_nodes_x210Match-
Node
dellemc_powerscale_nodes_nl410_firmwareMatch-
AND
dellemc_powerscale_nodes_nl410Match-
Node
dellemc_powerscale_nodes_a200_firmwareMatch-
AND
dellemc_powerscale_nodes_a200Match-
Node
dellemc_powerscale_nodes_a2000_firmwareMatch-
AND
dellemc_powerscale_nodes_a2000Match-
Node
dellemc_powerscale_nodes_h400_firmwareMatch-
AND
dellemc_powerscale_nodes_h400Match-
Node
dellemc_powerscale_nodes_h500_firmwareMatch-
AND
dellemc_powerscale_nodes_h500Match-
Node
dellemc_powerscale_nodes_h600_firmwareMatch-
AND
dellemc_powerscale_nodes_h600Match-
Node
dellemc_powerscale_nodes_h5600_firmwareMatch-
AND
dellemc_powerscale_nodes_h5600Match-
Node
dellemc_powerscale_nodes_f800_firmwareMatch-
AND
dellemc_powerscale_nodes_f800Match-
Node
dellemc_powerscale_nodes_f810_firmwareMatch-
AND
dellemc_powerscale_nodes_f810Match-
Node
dellemc_powerscale_nodes_f200_firmwareMatch-
AND
dellemc_powerscale_nodes_f200Match-
Node
dellemc_powerscale_nodes_f600_firmwareMatch-
AND
dellemc_powerscale_nodes_f600Match-
Node
dellemc_powerscale_nodes_a300_firmwareMatch-
AND
dellemc_powerscale_nodes_a300Match-
Node
dellemc_powerscale_nodes_a3000_firmwareMatch-
AND
dellemc_powerscale_nodes_a3000Match-
Node
dellemc_powerscale_nodes_h700_firmwareMatch-
AND
dellemc_powerscale_nodes_h700Match-
Node
dellemc_powerscale_nodes_h7000_firmwareMatch-
AND
dellemc_powerscale_nodes_h7000Match-

CNA Affected

[
  {
    "product": "PowerScale Nodes",
    "vendor": "Dell",
    "versions": [
      {
        "status": "affected",
        "version": "A100, S210, X410, H400, X210, NL410, A200, A2000, H400, H500, H600, H5600, F800, F810,F200, F600, A300, A3000, H700, H7000"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.3%

Related for CVE-2021-36315