DSA-2020-199: Dell EMC NetWorker vProxy Security Update for Multiple Vulnerabilities

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

Critical

Details

Summary:
The SUSE component within Dell EMC NetWorker vProxy requires a security update to address various vulnerabilities. 

Third-party Component CVE(s) More information
SUSE SLES12 Security Update: kernel (SUSE-SU-2020:1605-1) CVE-2018-1000199 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
CVE-2019-19462
CVE-2019-20806
CVE-2019-20812
CVE-2019-9455
CVE-2020-0543
CVE-2020-10690
CVE-2020-10711
CVE-2020-10720
CVE-2020-10732
CVE-2020-10751
CVE-2020-10757
CVE-2020-12114
CVE-2020-12464
CVE-2020-12652
CVE-2020-12653
CVE-2020-12654
CVE-2020-12655
CVE-2020-12656
CVE-2020-12657
CVE-2020-12768
CVE-2020-12769
CVE-2020-13143
SUSE SLES12 Security Update: adns (SUSE-SU-2020:1612-1) CVE-2017-9103
CVE-2017-9104
CVE-2017-9105
CVE-2017-9106
CVE-2017-9107
CVE-2017-9108
CVE-2017-9109
SUSE SLES12 Security Update: ruby2.1 (SUSE-SU-2020:1570-1) CVE-2015-9096,
CVE-2016-2339
CVE-2016-7798
CVE-2017-0898
CVE-2017-0899
CVE-2017-0900
CVE-2017-0901
CVE-2017-0902
CVE-2017-0903
CVE-2017-10784
CVE-2017-14033
CVE-2017-14064
CVE-2017-17405
CVE-2017-17742
CVE-2017-17790
CVE-2017-9228
CVE-2017-9229
CVE-2018-1000073
CVE-2018-1000074
CVE-2018-1000075
CVE-2018-1000076
CVE-2018-1000077
CVE-2018-1000078
CVE-2018-1000079
CVE-2018-16395
CVE-2018-16396
CVE-2018-6914
CVE-2018-8777
CVE-2018-8778
CVE-2018-8779
CVE-2018-8780
CVE-2019-15845
CVE-2019-16201
CVE-2019-16254
CVE-2019-16255
CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325
CVE-2020-10663
SUSE SLES12 Security Update: icu (SUSE-SU-2020:1180-1) CVE-2020-10531
SUSE SLES12 Security Update: openldap2 (SUSE-SU-2020:1193-1) CVE-2020-12243
SUSE SLES12 Security Update: bind (SUSE-SU-2020:1350-1) CVE-2020-8616
CVE-2020-8617
SUSE SLES12 Security Update: python (SUSE-SU-2020:1524-1) CVE-2019-18348
CVE-2019-9674
CVE-2020-8492
SUSE SLES12 Security Update: vim (SUSE-SU-2020:1550-1) CVE-2019-20807

For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm.  

To search for a particular CVE, use the database s search utility at http://web.nvd.nist.gov/view/vuln/search.
Third-party Component CVE(s) More information
SUSE SLES12 Security Update: kernel (SUSE-SU-2020:1605-1) CVE-2018-1000199 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
CVE-2019-19462
CVE-2019-20806
CVE-2019-20812
CVE-2019-9455
CVE-2020-0543
CVE-2020-10690
CVE-2020-10711
CVE-2020-10720
CVE-2020-10732
CVE-2020-10751
CVE-2020-10757
CVE-2020-12114
CVE-2020-12464
CVE-2020-12652
CVE-2020-12653
CVE-2020-12654
CVE-2020-12655
CVE-2020-12656
CVE-2020-12657
CVE-2020-12768
CVE-2020-12769
CVE-2020-13143
SUSE SLES12 Security Update: adns (SUSE-SU-2020:1612-1) CVE-2017-9103
CVE-2017-9104
CVE-2017-9105
CVE-2017-9106
CVE-2017-9107
CVE-2017-9108
CVE-2017-9109
SUSE SLES12 Security Update: ruby2.1 (SUSE-SU-2020:1570-1) CVE-2015-9096,
CVE-2016-2339
CVE-2016-7798
CVE-2017-0898
CVE-2017-0899
CVE-2017-0900
CVE-2017-0901
CVE-2017-0902
CVE-2017-0903
CVE-2017-10784
CVE-2017-14033
CVE-2017-14064
CVE-2017-17405
CVE-2017-17742
CVE-2017-17790
CVE-2017-9228
CVE-2017-9229
CVE-2018-1000073
CVE-2018-1000074
CVE-2018-1000075
CVE-2018-1000076
CVE-2018-1000077
CVE-2018-1000078
CVE-2018-1000079
CVE-2018-16395
CVE-2018-16396
CVE-2018-6914
CVE-2018-8777
CVE-2018-8778
CVE-2018-8779
CVE-2018-8780
CVE-2019-15845
CVE-2019-16201
CVE-2019-16254
CVE-2019-16255
CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325
CVE-2020-10663
SUSE SLES12 Security Update: icu (SUSE-SU-2020:1180-1) CVE-2020-10531
SUSE SLES12 Security Update: openldap2 (SUSE-SU-2020:1193-1) CVE-2020-12243
SUSE SLES12 Security Update: bind (SUSE-SU-2020:1350-1) CVE-2020-8616
CVE-2020-8617
SUSE SLES12 Security Update: python (SUSE-SU-2020:1524-1) CVE-2019-18348
CVE-2019-9674
CVE-2020-8492
SUSE SLES12 Security Update: vim (SUSE-SU-2020:1550-1) CVE-2019-20807

For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm.  

To search for a particular CVE, use the database s search utility at http://web.nvd.nist.gov/view/vuln/search.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Affected products:  Dell EMC NetWorker vProxy versions prior to 4.2.0-5


Remediation:      
The following Dell EMC NetWorker vProxy release addresses these vulnerabilities:      

  • Dell EMC NetWorker vProxy 4.2.0-5

For Dell EMC NetWorker vProxy 4.2.0-2 and later, the security update is contained in the release 4.2.0-5.

Dell EMC recommends all customers upgrade at the earliest opportunity.



Affected products:  Dell EMC NetWorker vProxy versions prior to 4.2.0-5


Remediation:      
The following Dell EMC NetWorker vProxy release addresses these vulnerabilities:      

  • Dell EMC NetWorker vProxy 4.2.0-5

For Dell EMC NetWorker vProxy 4.2.0-2 and later, the security update is contained in the release 4.2.0-5.

Dell EMC recommends all customers upgrade at the earliest opportunity.



Related Information

Affected Products

NetWorker

Products

Backup and Recovery Manager NetWorker, NetWorker, NetWorker Series, NetWorker for OpenVMS, NetWorker Management Console, NetWorker Module, NetWorker Module for Databases and Applications, NetWorker Module for MEDITECH, NetWorker Module for Microsoft , NetWorker Module for SAP, Product Security Information, vRealize Data Protection Extension for NetWorker ...
Article Properties
Article Number: 000153678
Article Type: Dell Security Advisory
Last Modified: 19 Sept 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.