DSA-2024-058 : Security Update for Dell Networker vProxy Multiple Components Vulnerabilities
Summary: Dell Networker vProxy remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
High
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| OpenSSH | CVE-2016-20012, CVE-2020-15778, CVE-2021-36368 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libvmtools | CVE-2023-20900 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| SUSE kernel | CVE-2023-5717 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| zlib | CVE-2023-45853 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| python | CVE-2022-48565, CVE-2022-48566 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libcares2 | CVE-2020-22217, CVE-2022-4904 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| sqlite3 | CVE-2023-2137 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| vim | CVE-2023-5535, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| ucode-intel | CVE-2023-23583 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| open-vm-tools | CVE-2023-34058, CVE-2023-34059, CVE-2023-20900 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| nghttp2 | CVE-2023-44487 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| suse-module-tools | CVE-2023-1829, CVE-2023-23559 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| grub2 | CVE-2023-4692, CVE-2023-4693 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Kernel | CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| shadow | CVE-2023-4641 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| gpg2 | CVE-2018-9234 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| nghttp2 | CVE-2023-35945 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| bind | CVE-2023-3341 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| curl | CVE-2023-38039 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| gawk | CVE-2023-4156 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Affected Products & Remediation
| CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|---|
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 |
NetWorker vProxy | vProxy OVA |
Versions 19.9 through 19.9.0.3 |
Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.8 through 19.8.0.4 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.7 through 19.7.0.5 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Version 19.7.1 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions prior to 19.7 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|---|
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 |
NetWorker vProxy | vProxy OVA |
Versions 19.9 through 19.9.0.3 |
Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.8 through 19.8.0.4 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.7 through 19.7.0.5 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Version 19.7.1 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions prior to 19.7 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Platforms: vProxy is built upon SUSE based Linux operating system. So it supports only Linux platform.
- Versions prior to 19.7 means versions 19.6.x, 19.5.x, 19.4.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
- Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
- Dell recommends that you always upgrade to the latest release/version for your product
Revision History
| Revision | Date | Description |
| 1.0 | 2024-01-25 | Initial Release |
Related Information
Legal Disclaimer
Affected Products
NetWorker Family, NetWorker, NetWorker Series, NetWorker Module, Product Security InformationArticle Properties
Article Number: 000221476
Article Type: Dell Security Advisory
Last Modified: 09 Sep 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.