First published: Sat Nov 20 2021(Updated: )
Networking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell SmartFabric OS10 | <10.4.3.8 | |
Dell SmartFabric OS10 | >=10.5.0.0<10.5.0.10 | |
Dell SmartFabric OS10 | >=10.5.1.0<10.5.1.10 | |
Dell SmartFabric OS10 | >=10.5.2.0<10.5.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36308 is considered a critical severity vulnerability due to the potential for remote unauthorized access to affected systems.
To remediate CVE-2021-36308, upgrade Dell Networking OS10 to versions 10.5.0.10 or later, or ensure your system is updated to versions beyond the listed vulnerable releases.
CVE-2021-36308 impacts Dell OS10 Networking Switches running versions prior to October 2021 with Smart Fabric Services enabled.
Yes, CVE-2021-36308 can be exploited remotely by an unauthenticated attacker without requiring any local access.
If exploited, CVE-2021-36308 allows an attacker to gain unauthorized access and potentially execute arbitrary actions on the affected Dell OS10 systems.