First published: Thu Dec 16 2021(Updated: )
iDRAC9 versions prior to 5.00.20.00 and iDRAC8 versions prior to 2.82.82.82 contain a stack-based buffer overflow vulnerability. An authenticated remote attacker with high privileges could potentially exploit this vulnerability to control process execution and gain access to the iDRAC operating system.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell iDRAC8 Firmware | <2.82.82.82 | |
Dell iDRAC8 | ||
Dell iDRAC9 Firmware | <5.00.20.00 | |
Dell iDRAC9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36347 is classified as a high severity vulnerability due to the potential for an authenticated remote attacker to exploit it.
To fix CVE-2021-36347, upgrade to iDRAC8 version 2.82.82.82 or iDRAC9 version 5.00.20.00 or later.
CVE-2021-36347 affects Dell Integrated Dell Remote Access Controller 8 and 9 firmware versions prior to the specified updates.
Yes, CVE-2021-36347 can potentially be exploited remotely by an authenticated attacker with high privileges.
CVE-2021-36347 is a stack-based buffer overflow vulnerability that may allow process control and unauthorized access.