DSA-2025-276: Security Update for Dell Data Protection Advisor for Multiple Third-Party Component Vulnerabilities

Résumé: Dell Data Protection Advisor remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Impact

Critical

Détails

Third-party Component CVE More Information
Apache CXF CVE-2021-22696, CVE-2021-30468, CVE-2022-46363, CVE-2022-46364 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Apache HTTP Client CVE-2014-3577, CVE-2015-5262 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Apache Santuario CVE-2021-40690, CVE-2023-44483 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Bouncy Castle Java CVE-2013-1624 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Expat CVE-2013-0340 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
FasterXML Jackson Databind CVE-2020-25649, CVE-2020-36518, CVE-2022-42003, CVE-2022-42004, CVE-2021-46877, CVE-2018-5968, CVE-2018-7489 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
FasterXML WoodStox CVE-2022-40152 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
JDK 8u441, JDK 8u451 CVE-2025-23083, CVE-2024-54534, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2025-30691, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44296, CVE-2024-44308, CVE-2024-54479, CVE-2024-54505, CVE-2024-54508, CVE-2024-54543, CVE-2025-24158, CVE-2024-47545, CVE-2024-47596, CVE-2024-47597, CVE-2025-23084, CVE-2025-23085 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
jQuery CVE-2020-11023 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Netty CVE-2019-16869, CVE-2019-20444, CVE-2019-20445, CVE-2020-11612, CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-24823, CVE-2022-41881, CVE-2023-34462 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
OpenSSL CVE-2016-0705, CVE-2016-0799, CVE-2016-2842, CVE-2015-3193, CVE-2015-3194, CVE-2016-0797, CVE-2016-0798, CVE-2021-3711, CVE-2016-6306, CVE-2017-3731, CVE-2017-3732 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
RESTEasy CVE-2023-0482 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
SQLite CVE-2022-46908 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
undertow CVE-2021-3597, CVE-2021-3629, CVE-2022-2053, CVE-2021-3690, CVE-2021-3859, CVE-2022-1259, CVE-2022-1319, CVE-2022-2764, CVE-2023-1108, CVE-2023-3223, CVE-2024-1459 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies recommande à tous les clients de prendre en compte à la fois le score de base CVSS et les scores temporels et environnementaux pertinents qui peuvent avoir un impact sur la gravité potentielle associée à une faille de sécurité donnée.

Produits concernés et mesure corrective

CVEs Addressed Product Affected Versions Remediated Versions Link

CVE-2014-3577, CVE-2015-5262, CVE-2021-40690, CVE-2023-44483, CVE-2013-1624, CVE-2021-46877, CVE-2021-3597, CVE-2021-3629, CVE-2022-2053, CVE-2021-3690, CVE-2021-3859, CVE-2022-1259, CVE-2022-1319, CVE-2022-2764, CVE-2023-1108, CVE-2023-3223, CVE-2016-6306, CVE-2017-3731, CVE-2017-3732, CVE-2013-0340, CVE-2020-11612, CVE-2022-24823, CVE-2022-46908, CVE-2019-16869, CVE-2019-20444, CVE-2019-20445, CVE-2020-25649, CVE-2020-36518, CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-22696, CVE-2021-30468, CVE-2021-37136, CVE-2021-37137,  CVE-2021-43797, CVE-2022-41881, CVE-2022-42003, CVE-2022-42004, CVE-2022-46363, CVE-2023-34462, CVE-2020-11023, CVE-2025-23083, CVE-2024-54534, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2025-30691, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44296, CVE-2024-44308, CVE-2024-54479, CVE-2024-54505, CVE-2024-54508, CVE-2024-54543, CVE-2025-24158, CVE-2024-47545, CVE-2024-47596, CVE-2024-47597, CVE-2025-23084, CVE-2025-23085

Data Protection Advisor

Versions 19.9 through 19.12

 19.12 SP1

Data Protection Advisor Downloads Area

 

CVE-2016-0705, CVE-2016-0799, CVE-2016-2842, CVE-2015-3193, CVE-2015-3194, CVE-2016-0797, CVE-2016-0798, CVE-2021-3711, CVE-2024-1459, CVE-2018-5968, CVE-2018-7489, CVE-2022-40152, CVE-2022-46364, CVE-2023-0482

Data Protection Advisor

Version 19.12

19.12 SP1

Data Protection Advisor Downloads Area

 

 

CVEs Addressed Product Affected Versions Remediated Versions Link

CVE-2014-3577, CVE-2015-5262, CVE-2021-40690, CVE-2023-44483, CVE-2013-1624, CVE-2021-46877, CVE-2021-3597, CVE-2021-3629, CVE-2022-2053, CVE-2021-3690, CVE-2021-3859, CVE-2022-1259, CVE-2022-1319, CVE-2022-2764, CVE-2023-1108, CVE-2023-3223, CVE-2016-6306, CVE-2017-3731, CVE-2017-3732, CVE-2013-0340, CVE-2020-11612, CVE-2022-24823, CVE-2022-46908, CVE-2019-16869, CVE-2019-20444, CVE-2019-20445, CVE-2020-25649, CVE-2020-36518, CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-22696, CVE-2021-30468, CVE-2021-37136, CVE-2021-37137,  CVE-2021-43797, CVE-2022-41881, CVE-2022-42003, CVE-2022-42004, CVE-2022-46363, CVE-2023-34462, CVE-2020-11023, CVE-2025-23083, CVE-2024-54534, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2025-30691, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44296, CVE-2024-44308, CVE-2024-54479, CVE-2024-54505, CVE-2024-54508, CVE-2024-54543, CVE-2025-24158, CVE-2024-47545, CVE-2024-47596, CVE-2024-47597, CVE-2025-23084, CVE-2025-23085

Data Protection Advisor

Versions 19.9 through 19.12

 19.12 SP1

Data Protection Advisor Downloads Area

 

CVE-2016-0705, CVE-2016-0799, CVE-2016-2842, CVE-2015-3193, CVE-2015-3194, CVE-2016-0797, CVE-2016-0798, CVE-2021-3711, CVE-2024-1459, CVE-2018-5968, CVE-2018-7489, CVE-2022-40152, CVE-2022-46364, CVE-2023-0482

Data Protection Advisor

Version 19.12

19.12 SP1

Data Protection Advisor Downloads Area

 

 

Notes:

  1. Dell recommends that you always upgrade to the latest release/version for your product.
  2. To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support.

Solutions de contournement et mesures d’atténuation

None

Historique des révisions

RevisionDateDescription
1.02025-07-03Initial release
2.02025-07-09Update related to the addition of JDK 8u441 and JDK 8u451 CVE IDs
3.02025-07-10Minor update related to product name

 

Informations connexes

Propriétés de l’article
Numéro d’article: 000340538
Type d’article: Dell Security Advisory
Dernière modification: 09 juil. 2025
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.