This issue only occurs on Dell Isilon systems with version 8.2.2 or earlier SSHD. It does not affect systems with version 8.2.3 or later SSHD. The following versions of the software are affected: Dell version 8.2.2 and later

By default, the Dell Isilon systems are configured to allow remote users to use the ssh and scp commands. This issue affects these users and presents a risk that remote users might gain access to sensitive information in the network. The following table lists the systems that are affected and the version of the software that they are running. Your system may not be listed, if the version of software that your system is running is listed below, then it is also vulnerable. System Affected Software Version End-user Risk ------------------------------------------------------------------------------------------ * Dell PowerEdge 2950 8.2.2 - 23 (R1) Direct remote access to servers via ssh and scp enabled. * Dell PowerEdge 2950 8.2.2 - 23 (R1) Direct remote access to servers via ssh and scp enabled. * Dell PowerEdge 2950 8.2.2 - 23 (R1) Direct remote access to servers via ssh and scp enabled. * Dell PowerEdge 2950 8.2.2 - 23 (R1) Direct remote access to servers via ssh and scp enabled. * Dell PowerEdge 2950 8.2.2 - 23 (R1) Direct remote access to servers

How to verify if your system is vulnerable?

If you have a Dell Isilon system that is configured to allow direct remote access, you need to verify if your system is vulnerable. To do so, run the command:
$ curl -sSL https://nfs.dell.com/pub/isilon-sshd-8.2.2-23/install | grep "Dell PowerEdge 2950"
If you see the text "Dell PowerEdge 2950 8.2.2 - 23 (R1)" in the output then your system is vulnerable and should be updated as soon as possible.

Timeline

Published on: 10/21/2022 18:15:00 UTC
Last modified on: 10/24/2022 15:32:00 UTC

References