First published: Mon Nov 01 2021(Updated: )
Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell SmartFabric OS10 | <10.4.3.8 | |
Dell SmartFabric OS10 | >=10.5.0.0<10.5.0.10 | |
Dell SmartFabric OS10 | >=10.5.1.0<10.5.1.10 | |
Dell SmartFabric OS10 | >=10.5.2.0<10.5.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36306 is considered a high-severity vulnerability due to its potential for unauthenticated access.
To mitigate CVE-2021-36306, upgrade to Dell SmartFabric OS10 version 10.4.3.9 or later, or 10.5.0.11 or later.
CVE-2021-36306 affects all versions of Dell SmartFabric OS10 prior to October 2021 with the RESTCONF API enabled.
Yes, a remote unauthenticated attacker can exploit CVE-2021-36306 to gain unauthorized access.
CVE-2021-36306 is an authentication bypass vulnerability found in the RESTCONF API.