DSA-2025-075: Security Update for Dell Data Protection Advisor for Multiple Vulnerabilities
Zusammenfassung: Dell Data Protection Advisor remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system.
Dieser Artikel gilt für
Dieser Artikel gilt nicht für
Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden.
In diesem Artikel werden nicht alle Produktversionen aufgeführt.
Auswirkungen
Critical
Details
| Third-party Component | CVEs | More Information |
| Apache Avro | CVE-2021-43045, CVE-2023-39410 | https://nvd.nist.gov/vuln/search |
| Apache commons collections | CVE-2015-7501 | https://nvd.nist.gov/vuln/search |
| Apache commons compress | CVE-2023-42503, CVE-2024-25710, CVE-2024-26308 | https://nvd.nist.gov/vuln/search |
| Apache Mina SSHD Common support utilities | CVE-2022-45047 | https://nvd.nist.gov/vuln/search |
| Apache Mina SSHD Core | CVE-2021-30129, CVE-2023-35887, CVE-2023-48795 | https://nvd.nist.gov/vuln/search |
| Apache Tomcat | CVE-2021-24122, CVE-2021-30640, CVE-2021-33037, CVE-2022-34305, CVE-2020-9484, CVE-2020-17527, CVE-2021-25122, CVE-2021-25329, CVE-2021-30639,CVE-2021-41079, CVE-2022-23181, CVE-2022-29885, CVE-2022-25762, CVE-2022-42252, CVE-2023-46589, CVE-2021-43980, CVE-2023-28708, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2024-21733 | https://nvd.nist.gov/vuln/search |
| Apache Velocity | CVE-2020-13936 | https://nvd.nist.gov/vuln/search |
| Apache Xerces | CVE-2022-23437 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2023-38545 | https://nvd.nist.gov/vuln/search |
| Dom4j | CVE-2020-10683 | https://nvd.nist.gov/vuln/search |
| Google-guava | CVE-2023-2976, CVE-2020-8908 | https://nvd.nist.gov/vuln/search |
| H2 Database Engine | CVE-2022-45868 | https://nvd.nist.gov/vuln/search |
| Java SE 8u421 | CVE-2024-21235, CVE-2024-21217, CVE-2024-21210, CVE-2024-21208 | https://nvd.nist.gov/vuln/search |
| Jboss REST Easy | CVE-2016-9606, CVE-2020-25633 | https://nvd.nist.gov/vuln/search |
| Jettison | CVE-2022-40149, CVE-2022-40150, CVE-2022-45685, CVE-2022-45693, CVE-2023-1436 | https://nvd.nist.gov/vuln/search |
| JGit | CVE-2023-4759 | https://nvd.nist.gov/vuln/search |
| Jsoup | CVE-2021-37714, CVE-2022-36033 | https://nvd.nist.gov/vuln/search |
| libcurl | CVE-2023-27537, CVE-2023-38039 | https://nvd.nist.gov/vuln/search |
| MySql Connector | CVE-2023-22102, CVE-2023-21971 | https://nvd.nist.gov/vuln/search |
| okHttp | CVE-2018-20200 | https://nvd.nist.gov/vuln/search |
| PostgreSQL driver | CVE-2024-1597 | https://nvd.nist.gov/vuln/search |
| Slf4j_ext | CVE-2018-8088 | https://nvd.nist.gov/vuln/search |
| SnakeYaml | CVE-2022-41854, CVE-2022-38750,CVE-2022-38751, CVE-2022-38749, CVE-2022-25857, CVE-2022-1471, CVE-2022-38752 | https://nvd.nist.gov/vuln/search |
| SSH | CVE-2023-46445, CVE-2023-46446 | https://nvd.nist.gov/vuln/search |
| Wildfly | CVE-2020-14338 | https://nvd.nist.gov/vuln/search |
| XML External Entity | CVE-2014-3530 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46699 | Dell Data Protection Advisor, versions prior to 19.12, contains an Improper Neutralization of Special Elements Used in a Template Engine vulnerability in the Server. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46699 | Dell Data Protection Advisor, versions prior to 19.12, contains an Improper Neutralization of Special Elements Used in a Template Engine vulnerability in the Server. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
Betroffene Produkte und Korrektur
| Product | Affected Versions | Remediated Versions | Link to Update |
| Data Protection Advisor | Versions 19.9, 19.10 and 19.11 | Version 19.12 or later | Data Protection Advisor Downloads Area |
| Product | Affected Versions | Remediated Versions | Link to Update |
| Data Protection Advisor | Versions 19.9, 19.10 and 19.11 | Version 19.12 or later | Data Protection Advisor Downloads Area |
Notes:
- Dell recommends that you always upgrade to the latest release/version for your product.
- To request the workaround files that remove the affected OpenSSL-dependent libraries, or to receive assistance with applying the workaround, please contact Dell Customer Support.
Workarounds und Korrekturmaßnahmen
| CVE ID | Workaround and Mitigation |
|
CVE-2024-5535, CVE-2023-3446 |
Pre-requisites:
For Linux:
# chmod 0777 unbundle_openssl_102_Libs_From_DPA
Note: Post execution the script will automatically remove libssl.so.1.0.0, libcrypto.so.1.0.0, dpaagent_modhparray, and dpaagent_modhpvls and exit.
For Windows:
Note: Post execution of the script will automatically remove libeay32.dll, ssleay32.dll, dpaagent_modhparray.exe, dpaagent_modhpvls.exe and exit. |
Revisionsverlauf
| Revision | Date | Description |
| 1.0 | 2025-02-06 | Initial Release |
| 2.0 | 2025-06-11 | Minor updates related to workaround and formatting |
| 3.0 | 2025-06-18 | Minor update related to workaround files availability |
| 4.0 | 2026-01-21 | Major update to include CVE-2025-46699 |
Zugehörige Informationen
Rechtlicher Hinweis
Betroffene Produkte
Data Protection Advisor, Data Protection Suite SeriesArtikeleigenschaften
Artikelnummer: 000281732
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 21 Jan. 2026
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.