DSA-2025-276: Security Update for Dell Data Protection Advisor for Multiple Third-Party Component Vulnerabilities
Summary: Dell Data Protection Advisor remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Impact
Critical
Details
| Third-party Component | CVE | More Information |
| Apache CXF | CVE-2021-22696, CVE-2021-30468, CVE-2022-46363, CVE-2022-46364 | https://nvd.nist.gov/vuln/search |
| Apache HTTP Client | CVE-2014-3577, CVE-2015-5262 | https://nvd.nist.gov/vuln/search |
| Apache Santuario | CVE-2021-40690, CVE-2023-44483 | https://nvd.nist.gov/vuln/search |
| Bouncy Castle Java | CVE-2013-1624 | https://nvd.nist.gov/vuln/search |
| Expat | CVE-2013-0340 | https://nvd.nist.gov/vuln/search |
| FasterXML Jackson Databind | CVE-2020-25649, CVE-2020-36518, CVE-2022-42003, CVE-2022-42004, CVE-2021-46877, CVE-2018-5968, CVE-2018-7489 | https://nvd.nist.gov/vuln/search |
| FasterXML WoodStox | CVE-2022-40152 | https://nvd.nist.gov/vuln/search |
| JDK 8u441, JDK 8u451 | CVE-2025-23083, CVE-2024-54534, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2025-30691, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44296, CVE-2024-44308, CVE-2024-54479, CVE-2024-54505, CVE-2024-54508, CVE-2024-54543, CVE-2025-24158, CVE-2024-47545, CVE-2024-47596, CVE-2024-47597, CVE-2025-23084, CVE-2025-23085 | https://nvd.nist.gov/vuln/search |
| jQuery | CVE-2020-11023 | https://nvd.nist.gov/vuln/search |
| Netty | CVE-2019-16869, CVE-2019-20444, CVE-2019-20445, CVE-2020-11612, CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-24823, CVE-2022-41881, CVE-2023-34462 | https://nvd.nist.gov/vuln/search |
| OpenSSL | CVE-2016-0705, CVE-2016-0799, CVE-2016-2842, CVE-2015-3193, CVE-2015-3194, CVE-2016-0797, CVE-2016-0798, CVE-2021-3711, CVE-2016-6306, CVE-2017-3731, CVE-2017-3732 | https://nvd.nist.gov/vuln/search |
| RESTEasy | CVE-2023-0482 | https://nvd.nist.gov/vuln/search |
| SQLite | CVE-2022-46908 | https://nvd.nist.gov/vuln/search |
| undertow | CVE-2021-3597, CVE-2021-3629, CVE-2022-2053, CVE-2021-3690, CVE-2021-3859, CVE-2022-1259, CVE-2022-1319, CVE-2022-2764, CVE-2023-1108, CVE-2023-3223, CVE-2024-1459 | https://nvd.nist.gov/vuln/search |
Affected Products & Remediation
| CVEs Addressed | Product | Affected Versions | Remediated Versions | Link |
|
CVE-2014-3577, CVE-2015-5262, CVE-2021-40690, CVE-2023-44483, CVE-2013-1624, CVE-2021-46877, CVE-2021-3597, CVE-2021-3629, CVE-2022-2053, CVE-2021-3690, CVE-2021-3859, CVE-2022-1259, CVE-2022-1319, CVE-2022-2764, CVE-2023-1108, CVE-2023-3223, CVE-2016-6306, CVE-2017-3731, CVE-2017-3732, CVE-2013-0340, CVE-2020-11612, CVE-2022-24823, CVE-2022-46908, CVE-2019-16869, CVE-2019-20444, CVE-2019-20445, CVE-2020-25649, CVE-2020-36518, CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-22696, CVE-2021-30468, CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-41881, CVE-2022-42003, CVE-2022-42004, CVE-2022-46363, CVE-2023-34462, CVE-2020-11023, CVE-2025-23083, CVE-2024-54534, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2025-30691, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44296, CVE-2024-44308, CVE-2024-54479, CVE-2024-54505, CVE-2024-54508, CVE-2024-54543, CVE-2025-24158, CVE-2024-47545, CVE-2024-47596, CVE-2024-47597, CVE-2025-23084, CVE-2025-23085 |
Data Protection Advisor |
Versions 19.9 through 19.12 |
19.12 SP1 |
Data Protection Advisor Downloads Area
|
| CVE-2016-0705, CVE-2016-0799, CVE-2016-2842, CVE-2015-3193, CVE-2015-3194, CVE-2016-0797, CVE-2016-0798, CVE-2021-3711, CVE-2024-1459, CVE-2018-5968, CVE-2018-7489, CVE-2022-40152, CVE-2022-46364, CVE-2023-0482 |
Data Protection Advisor |
Version 19.12 |
19.12 SP1 |
Data Protection Advisor Downloads Area
|
| CVEs Addressed | Product | Affected Versions | Remediated Versions | Link |
|
CVE-2014-3577, CVE-2015-5262, CVE-2021-40690, CVE-2023-44483, CVE-2013-1624, CVE-2021-46877, CVE-2021-3597, CVE-2021-3629, CVE-2022-2053, CVE-2021-3690, CVE-2021-3859, CVE-2022-1259, CVE-2022-1319, CVE-2022-2764, CVE-2023-1108, CVE-2023-3223, CVE-2016-6306, CVE-2017-3731, CVE-2017-3732, CVE-2013-0340, CVE-2020-11612, CVE-2022-24823, CVE-2022-46908, CVE-2019-16869, CVE-2019-20444, CVE-2019-20445, CVE-2020-25649, CVE-2020-36518, CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-22696, CVE-2021-30468, CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-41881, CVE-2022-42003, CVE-2022-42004, CVE-2022-46363, CVE-2023-34462, CVE-2020-11023, CVE-2025-23083, CVE-2024-54534, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2025-30691, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44296, CVE-2024-44308, CVE-2024-54479, CVE-2024-54505, CVE-2024-54508, CVE-2024-54543, CVE-2025-24158, CVE-2024-47545, CVE-2024-47596, CVE-2024-47597, CVE-2025-23084, CVE-2025-23085 |
Data Protection Advisor |
Versions 19.9 through 19.12 |
19.12 SP1 |
Data Protection Advisor Downloads Area
|
| CVE-2016-0705, CVE-2016-0799, CVE-2016-2842, CVE-2015-3193, CVE-2015-3194, CVE-2016-0797, CVE-2016-0798, CVE-2021-3711, CVE-2024-1459, CVE-2018-5968, CVE-2018-7489, CVE-2022-40152, CVE-2022-46364, CVE-2023-0482 |
Data Protection Advisor |
Version 19.12 |
19.12 SP1 |
Data Protection Advisor Downloads Area
|
Notes:
- Dell recommends that you always upgrade to the latest release/version for your product.
- To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support.
Workarounds & Mitigations
None
Revision History
| Revision | Date | Description |
| 1.0 | 2025-07-03 | Initial release |
| 2.0 | 2025-07-09 | Update related to the addition of JDK 8u441 and JDK 8u451 CVE IDs |
| 3.0 | 2025-07-10 | Minor update related to product name |