DSA-2025-387: Security Update for Dell CloudBoost Virtual Appliance Multiple Vulnerabilities
Shrnutí: Dell CloudBoost Virtual Appliance remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Tento článek se vztahuje na
Tento článek se nevztahuje na
Tento článek není vázán na žádný konkrétní produkt.
V tomto článku nejsou uvedeny všechny verze produktu.
Vliv
Critical
Podrobnosti
| Third-party Component | CVEs | More Information |
| Bind | CVE-2024-11187, CVE-2024-12705 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2024-0853 | https://nvd.nist.gov/vuln/search |
| Django | CVE-2025-32873, CVE-2025-48432 | https://nvd.nist.gov/vuln/search |
| GNU elfutils | CVE-2025-1377, CVE-2024-25260, CVE-2025-1371, CVE-2025-1365, CVE-2025-1372 | https://nvd.nist.gov/vuln/search |
| Expat | CVE-2024-8176 | https://nvd.nist.gov/vuln/search |
| FreeType | CVE-2025-27363 | https://nvd.nist.gov/vuln/search |
| GLib | CVE-2025-4373 | https://nvd.nist.gov/vuln/search |
| GNU C Library | CVE-2025-4802 | https://nvd.nist.gov/vuln/search |
| GnuPG | CVE-2025-30258 | https://nvd.nist.gov/vuln/search |
| HAProxy | CVE-2025-32464 | https://nvd.nist.gov/vuln/search |
| Intel Microcode | CVE-2024-45332, CVE-2025-24495, CVE-2025-20623, CVE-2025-20103, CVE-2025-20054, CVE-2024-43420, CVE-2024-28956, CVE-2025-20012 | https://nvd.nist.gov/vuln/search |
| Oracle Java SE | CVE-2025-30691, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2024-54534, CVE-2025-23083, CVE-2025-24162, CVE-2025-24158, CVE-2025-24150, CVE-2025-24143, CVE-2025-23085, CVE-2025-23084, CVE-2024-54543, CVE-2024-54508, CVE-2024-54505, CVE-2024-54502, CVE-2024-54479, CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775, CVE-2024-47597, CVE-2024-47596, CVE-2024-47546, CVE-2024-47545, CVE-2024-47544, CVE-2024-44309, CVE-2024-44308, CVE-2024-44296, CVE-2024-44244, CVE-2024-44187, CVE-2024-44185, CVE-2024-40866, CVE-2024-27856 | https://nvd.nist.gov/vuln/search |
| Kerberos | CVE-2025-3576 | https://nvd.nist.gov/vuln/search |
| libxml2 | CVE-2025-32415, CVE-2025-32414 | https://nvd.nist.gov/vuln/search |
| Libxslt | CVE-2024-55549, CVE-2025-24855 | https://nvd.nist.gov/vuln/search |
| Linux kernel | CVE-2023-52664, CVE-2023-52927, CVE-2024-57977, CVE-2025-21760, CVE-2024-57979, CVE-2025-21731, CVE-2024-58052,CVE-2025-21744, CVE-2025-21887, CVE-2024-58072, CVE-2025-21802, CVE-2025-21943,CVE-2025-21722, CVE-2025-21814, CVE-2025-21811, CVE-2025-21878, CVE-2025-21917,CVE-2025-21715, CVE-2025-21711, CVE-2025-21804, CVE-2024-58002, CVE-2025-21785,CVE-2025-21795, CVE-2024-58055, CVE-2024-58071, CVE-2025-21728, CVE-2025-21749,CVE-2025-21858, CVE-2025-21721, CVE-2025-21727, CVE-2024-58020, CVE-2025-21866,CVE-2025-21912, CVE-2025-21781, CVE-2024-58007, CVE-2025-21806, CVE-2025-21950,CVE-2025-21844, CVE-2025-21924, CVE-2024-57986, CVE-2024-57980, CVE-2025-21772,CVE-2025-21926, CVE-2025-21823, CVE-2025-21726, CVE-2025-21753, CVE-2025-21708,CVE-2024-58014, CVE-2025-21779, CVE-2024-56599, CVE-2024-58063, CVE-2025-21830,CVE-2025-21748, CVE-2025-21909, CVE-2024-58058, CVE-2025-21826, CVE-2025-21910,CVE-2025-21776, CVE-2025-21871, CVE-2025-21791, CVE-2024-58076, CVE-2024-58085,CVE-2024-58090, CVE-2024-58010, CVE-2025-21848, CVE-2025-21835, CVE-2024-58017,CVE-2025-21761, CVE-2024-58051, CVE-2025-21898, CVE-2025-21971, CVE-2024-47726,CVE-2025-21718, CVE-2025-21684, CVE-2025-21735, CVE-2024-57978, CVE-2025-21758,CVE-2024-56721, CVE-2025-21764, CVE-2025-21951, CVE-2025-21820, CVE-2025-21922,CVE-2025-21736, CVE-2025-21862, CVE-2025-21719, CVE-2025-21846, CVE-2025-21934,CVE-2024-58001, CVE-2025-21904, CVE-2025-21865, CVE-2025-21787, CVE-2025-21763,CVE-2025-21919, CVE-2025-21647, CVE-2024-57981, CVE-2024-58016, CVE-2025-21766,CVE-2025-21914, CVE-2025-21916, CVE-2024-57973, CVE-2025-21765, CVE-2024-58083,CVE-2025-21925, CVE-2025-21796, CVE-2025-21920, CVE-2024-26982, CVE-2025-21782,CVE-2025-21704, CVE-2025-21767, CVE-2024-58069, CVE-2025-21877, CVE-2025-21799,CVE-2025-21935, CVE-2025-21905, CVE-2024-58005, CVE-2024-58086, CVE-2025-21928,CVE-2024-58079, CVE-2025-21762, CVE-2025-21745, CVE-2025-21875, CVE-2025-21707,CVE-2024-58034, CVE-2025-21948, CVE-2024-57834, CVE-2025-21859, CVE-2024-53168, CVE-2024-56551, CVE-2024-56608 | https://nvd.nist.gov/vuln/search |
| MySQL | CVE-2025-30722, CVE-2025-30682, CVE-2025-30703, CVE-2025-21580, CVE-2025-30681,CVE-2025-21574, CVE-2025-30696, CVE-2025-21584, CVE-2025-21581, CVE-2025-30687,CVE-2025-30704, CVE-2025-30683, CVE-2025-30685, CVE-2025-30693, CVE-2025-30684,CVE-2025-21579, CVE-2025-30695, CVE-2025-30688, CVE-2025-30699, CVE-2025-30721,CVE-2025-21577, CVE-2025-30715, CVE-2025-30689, CVE-2025-21585, CVE-2025-21588,CVE-2025-30705, CVE-2025-21575 | https://nvd.nist.gov/vuln/search |
| Net-tools | CVE-2025-46836 | https://nvd.nist.gov/vuln/search |
| Open VM Tools | CVE-2025-22247 | https://nvd.nist.gov/vuln/search |
| Perl | CVE-2024-56406 | https://nvd.nist.gov/vuln/search |
| pykerberos | CVE-2015-3206 | https://nvd.nist.gov/vuln/search |
| Ruby | CVE-2025-27219, CVE-2024-39908, CVE-2024-43398, CVE-2024-41123, CVE-2025-27220, CVE-2025-25186, CVE-2025-27221, CVE-2024-35176 | https://nvd.nist.gov/vuln/search |
| SQLite | CVE-2025-29088, CVE-2025-3277, CVE-2025-29087 | https://nvd.nist.gov/vuln/search |
| Systemd | CVE-2025-4598 | https://nvd.nist.gov/vuln/search |
| Vim | CVE-2025-26603, CVE-2025-1215 | https://nvd.nist.gov/vuln/search |
| Zlib | CVE-2023-45853, CVE-2022-37434, CVE-2016-9841, CVE-2016-9843, CVE-2016-9842, CVE-2018-25032 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
Dotčené produkty a náprava
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
Notes:
- The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Versions prior to 19.13.0.2 means version 19.13.0.0 and 19.12.x, 19.11.x, 19.10.x, and 19.9.x family of main releases that are still under standard support. For more information refer to Dell End-of-Life Product List for Converged Infrastructure and Storage.
- Unless specified as impacted, the term “later releases” encompasses all Dell CloudBoost Virtual Appliance releases, under standard support, that are of a higher minor or major version than the specified release. Dell recommends that you always upgrade to the latest release/version for your product.
Zástupná řešení a opatření pro zmírnění rizik
None
Historie změn
| Revision | Date | Description |
| 1.0 | 2025-12-01 | Initial Release |
Související informace
Právní upozornění
Dotčené produkty
CloudBoost, CloudBoost Virtual ApplianceVlastnosti článku
Číslo článku: 000397417
Typ článku: Dell Security Advisory
Poslední úprava: 01 pro 2025
Najděte odpovědi na své otázky od ostatních uživatelů společnosti Dell
Služby podpory
Zkontrolujte, zda se na vaše zařízení vztahují služby podpory.