Critical
Note: Highest CVSS score of affected CVEs is Critical from CVE-2023-37920. Highest CVSS score of affected CVEs is High from CVE-2022-4450 and CVE-2023-0215. Note: For more details about DDOS versions available for download, see the links below (requires log in to Dell Support to view articles): https://www.dell.com/support/kbdoc/334649 and https://www.dell.com/support/kbdoc/525902
Third-Party Component | CVEs | More information |
---|---|---|
Apache | CVE-2023-31122, CVE-2023-43622, CVE-2023-45802 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Tomcat | CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
avahi | CVE-2023-38473 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Batik XML utility | CVE-2022-44730, CVE-2022-44729 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
bind | CVE-2023-3341 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
binutils | CVE-2020-19726, CVE-2021-32256, CVE-2022-4285, CVE-2022-35205, CVE-2022-35206, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-0687, CVE-2023-1579, CVE-2023-1972, CVE-2023-2222, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588, CVE-2022-4285 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
cairo-pixman | CVE-2022-44638 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
cups | CVE-2023-4504, CVE-2023-32360, CVE-2023-34241 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
curl | CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-28322, CVE-2023-28320, CVE-2023-28321, CVE-2023-46218, CVE-2023-28319 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
expat | CVE-2022-43680, CVE-2022-23990, CVE-2022-25313 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
flask | CVE-2023-30861 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
gcc | CVE-2023-4039 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
git | CVE-2023-29007, CVE-2023-25652, CVE-2023-23946, CVE-2023-22490, CVE-2022-41953 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
glib | CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
glibc | CVE-2023-4813 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
gpg2 | CVE-2018-9234 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
grub2 | CVE-2023-4692, CVE-2023-4693 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
kernel | CVE-2023-31085, CVE-2023-34324, CVE-2023-39189, CVE-2023-45862, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2022-36402, CVE-2023-2007, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-20588, CVE-2023-34319, CVE-2023-40283 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libarchive | CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
gcc-based toolchains | CVE-2023-4039 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libcap2 | CVE-2023-2603 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
binutils | CVE-2022-35206, CVE-2022-44840, CVE-2022-4285, CVE-2022-48065, CVE-2022-48064, CVE-2022-48063, CVE-2023-25585, CVE-2023-25588, CVE-2023-1972, CVE-2023-1579, CVE-2022-35205, CVE-2022-45703, CVE-2021-32256, CVE-2022-47673, CVE-2020-19726, CVE-2022-47695, CVE-2022-47696 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libeconf0 | CVE-2023-22652, CVE-2023-32181, CVE-2023-30079, CVE-2023-30078 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
ncurses | CVE-2023-50495 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libnghttp2-14 | CVE-2023-35945, CVE-2023-44487 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libopenssl1_1 | CVE-2023-3817, CVE-2023-5678, CVE-2023-4807 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
postgresql | CVE-2023-5870, CVE-2023-5868, CVE-2023-5869 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
procps | CVE-2023-4016 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libsndfile | CVE-2022-33065 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libsqlite3-0 | CVE-2023-2137 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libtiff5 | CVE-2022-1622, CVE-2023-2731, CVE-2023-26965, CVE-2023-1916, CVE-2022-40090 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libvpx | CVE-2023-5217 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libwebp7 | CVE-2023-4863 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libX11 | CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-3138 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libxml2 | CVE-2016-3709, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libXpm | CVE-2023-43788, CVE-2023-43789 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libz1,zlib-devel | CVE-2023-45853 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libzck1 | CVE-2023-46228 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
mdadm | CVE-2023-28736, CVE-2023-28938 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
mutt | CVE-2023-4874, CVE-2023-4875 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
nghttp2 | CVE-2023-35945, CVE-2023-44487 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
nginx | CVE-2022-41741, CVE-2023-44487, CVE-2022-41742 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
ntp | CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
opensc | CVE-2021-42782, CVE-2023-40661 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
openssh | CVE-2023-48795 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
openssl | CVE-2022-4304, CVE-2023-0215, CVE-2023-0286, CVE-2023-0464, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-5678, CVE-2022-4450 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
open-vm-tools | CVE-2023-34059,CVE-2023-20900 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
perl | CVE-2023-31486, CVE-2023-3148 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
pillow | CVE-2023-4863, CVE-2023-44271 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
pip | CVE-2023-5752 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
postfix | CVE-2023-32182 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
python | CVE-2022-48565, CVE-2022-48566, CVE-2023-41105, CVE-2023-40217, CVE-2023-37920, CVE-2023-27043, CVE-2023-36632 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
requests | CVE-2023-32681 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
shadow | CVE-2023-4641 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
sqlite3 | CVE-2023-2137 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
suse-module-tools | CVE-2023-1829, CVE-2023-23559 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
thymeleaf | CVE-2023-38286 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
tiff | CVE-2020-18768, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-25433, CVE-2023-26966, CVE-2023-38288, CVE-2023-38289 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
ucode-intel | CVE-2023-23583 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
urllib3 | CVE-2023-45803, CVE-2023-45804 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
uwsgi | CVE-2023-27522 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
vim | CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-46246 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
vorbis-tools | CVE-2023-43361 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
werkzeug | CVE-2023-46136 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
zlib | CVE-2023-45853 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-28973 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a high privileged victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. | 5.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L |
CVE-2024-29176 | Dell PowerProtect DD, version(s) 8.0, 7.13.1.0, 7.10.1.30, 7.7.5.40, contain(s) an Out-of-bounds Write vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution. | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-29177 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a disclosure of temporary sensitive information vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the reuse of disclosed information to gain unauthorized access to the application report. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
CVE-2024-29173 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Server-Side Request Forgery (SSRF) vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to disclosure of information on the application or remote client.
|
6.8 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N |
CVE-2024-29174 | Dell Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contain an SQL Injection vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized access to application data. | 4.4 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
CVE-2024-29175 | Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information. | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVE-2024-37138 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system. | 4.1 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N |
CVE-2024-37139 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an Improper Control of a Resource Through its Lifetime vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to temporary resource constraint of system application. Exploitation may lead to denial of service of the application. | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2024-37140 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an OS command injection vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-37141 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an open redirect vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to information disclosure. | 3.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-28973 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a high privileged victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. | 5.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L |
CVE-2024-29176 | Dell PowerProtect DD, version(s) 8.0, 7.13.1.0, 7.10.1.30, 7.7.5.40, contain(s) an Out-of-bounds Write vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution. | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-29177 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a disclosure of temporary sensitive information vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the reuse of disclosed information to gain unauthorized access to the application report. | 2.7 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
CVE-2024-29173 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Server-Side Request Forgery (SSRF) vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to disclosure of information on the application or remote client.
|
6.8 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N |
CVE-2024-29174 | Dell Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contain an SQL Injection vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized access to application data. | 4.4 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
CVE-2024-29175 | Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information. | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVE-2024-37138 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system. | 4.1 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N |
CVE-2024-37139 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an Improper Control of a Resource Through its Lifetime vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to temporary resource constraint of system application. Exploitation may lead to denial of service of the application. | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2024-37140 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an OS command injection vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-37141 | Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an open redirect vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to information disclosure. | 3.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
CVEs Addressed | Product | Software/Firmware | Affected Versions | Updated Versions | Link to Update |
---|---|---|---|---|---|
CVE-2024-28973, CVE-2024-29176, CVE-2024-29177, CVE-2024-29173, CVE-2024-29175, CVE-2024-37139, CVE-2024-37140, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-35945, CVE-2023-44487, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-48795, CVE-2023-37920, CVE-2023-45803, CVE-2023-45804, CVE-2023-45853 | Dell PowerProtect DD series appliances, Dell PowerProtect DD Virtual Edition, Dell APEX Protection Storage |
Data Domain Operating System | Versions 7.0 through 7.13 | Version 8.0.0.10 or later, or Version 7.13.1.0 or later to stay on LTS2024 Version 7.13, or 7.10.1.30 or later to stay on LTS2023 Version 7.10, or Version 7.7.5.40 or later to stay on LTS2022 Version 7.7 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
CVE-2024-28973, CVE-2024-29176, CVE-2024-29177, CVE-2024-29173, CVE-2024-29175, CVE-2024-37139, CVE-2024-37140, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-35945, CVE-2023-44487, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-48795, CVE-2023-37920, CVE-2023-45803, CVE-2023-45804, CVE-2023-45853 | PowerProtect Data Manager Appliance model: DM5500 | Data Domain Operating System | Versions prior to 5.16.0.0 | Version 5.16.0.0 or later | Link to download (requires log in to Dell Support) |
CVE-2023-0215, CVE-2022-4450, CVE-2022-4304 | Dell PowerProtect DD appliance models: DD6300, DD6800, and DD9300 | BIOS | Version 7.0 through 7.13 | Version 8.0.0.10 or later, or Version 7.13.1.0 or later to stay on LTS2024 Version 7.13, or Version 7.10.1.30 or later to stay on LTS2023 Version 7.10, or Version 7.7.5.40 or later to stay on LTS2022 Version 7.7 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
CVE-2024-29177, CVE-2024-29174, CVE-2024-29175, CVE-2024-37138, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-44730, CVE-2022-44729, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-28322, CVE-2023-28320, CVE-2023-28321, CVE-2023-46218, CVE-2023-28319, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-30861, CVE-2023-29007, CVE-2023-25652, CVE-2023-23946, CVE-2023-22490, CVE-2022-41953, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-4813, CVE-2023-1972, CVE-2023-1579, CVE-2022-4285, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-4039, CVE-2023-2603, CVE-2022-35206, CVE-2022-44840, CVE-2022-4285, CVE-2022-48065, CVE-2022-48064, CVE-2022-48063, CVE-2023-25585, CVE-2023-25588, CVE-2023-1972, CVE-2023-1579, CVE-2022-35205, CVE-2022-45703, CVE-2021-32256, CVE-2022-47673, CVE-2020-19726, CVE-2022-47695, CVE-2022-47696, CVE-2023-22652, CVE-2023-32181, CVE-2023-30079, CVE-2023-30078, CVE-2023-50495, CVE-2023-35945, CVE-2023-44487, CVE-2023-3817, CVE-2023-5678, CVE-2023-4807, CVE-2023-4016, CVE-2023-40217, CVE-2023-27043, CVE-2023-36632, CVE-2023-2137, CVE-2022-1622, CVE-2023-2731, CVE-2023-26965, CVE-2023-1916, CVE-2022-40090, CVE-2023-4863, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-3138, CVE-2023-43788, CVE-2023-43789, CVE-2023-46228, CVE-2023-35945, CVE-2023-44487, CVE-2022-41741, CVE-2023-44487, CVE-2022-41742, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-31486, CVE-2023-3148, CVE-2023-4863, CVE-2023-44271, CVE-2023-5752, CVE-2023-48795, CVE-2023-37920, CVE-2023-4641, CVE-2023-38286, CVE-2023-45803, CVE-2023-45804, CVE-2023-27522, CVE-2023-46136, CVE-2023-45853 | Dell PowerProtect DD Management Center | Data Domain Operating System | Version 7.0 through 7.13 | Version 8.0.0.10 or later, or Version 7.13.1.0 or later to stay on LTS2024 Version 7.13, or Version 7.10.1.30 or later to stay on LTS2023 Version 7.10, or Version 7.7.5.40 or later to stay on LTS2022 Version 7.7 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
CVE-2024-29177, CVE-2024-29174, CVE-2024-29175, CVE-2024-37138, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-44730, CVE-2022-44729, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-28322, CVE-2023-28320, CVE-2023-28321, CVE-2023-46218, CVE-2023-28319, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-30861, CVE-2023-29007, CVE-2023-25652, CVE-2023-23946, CVE-2023-22490, CVE-2022-41953, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-4813, CVE-2023-1972, CVE-2023-1579, CVE-2022-4285, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-4039, CVE-2023-2603, CVE-2022-35206, CVE-2022-44840, CVE-2022-4285, CVE-2022-48065, CVE-2022-48064, CVE-2022-48063, CVE-2023-25585, CVE-2023-25588, CVE-2023-1972, CVE-2023-1579, CVE-2022-35205, CVE-2022-45703, CVE-2021-32256, CVE-2022-47673, CVE-2020-19726, CVE-2022-47695, CVE-2022-47696, CVE-2023-22652, CVE-2023-32181, CVE-2023-30079, CVE-2023-30078, CVE-2023-50495, CVE-2023-35945, CVE-2023-44487, CVE-2023-3817, CVE-2023-5678, CVE-2023-4807, CVE-2023-4016, CVE-2023-40217, CVE-2023-27043, CVE-2023-36632, CVE-2023-2137, CVE-2022-1622, CVE-2023-2731, CVE-2023-26965, CVE-2023-1916, CVE-2022-40090, CVE-2023-4863, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-43788, CVE-2023-43789, CVE-2023-46228, CVE-2023-35945, CVE-2023-44487, CVE-2022-41741, CVE-2023-44487, CVE-2022-41742, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-31486, CVE-2023-3148, CVE-2023-4863, CVE-2023-44271, CVE-2023-5752, CVE-2023-37920, CVE-2023-4641, CVE-2023-38286, CVE-2023-45803, CVE-2023-45804, CVE-2023-27522, CVE-2023-46136, CVE-2023-45853, CVE-2023-38473, CVE-2023-3341, CVE-2020-19726, CVE-2021-32256, CVE-2022-4285, CVE-2022-35205, CVE-2022-35206, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-0687, CVE-2023-1579, CVE-2023-1972, CVE-2023-2222, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588, CVE-2022-44638, CVE-2023-4504, CVE-2023-32360, CVE-2023-34241, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-28322, CVE-2023-28320, CVE-2023-28321, CVE-2023-46218, CVE-2023-28319, CVE-2023-4039, CVE-2018-9234, CVE-2023-4692, CVE-2023-4693, CVE-2023-31085, CVE-2023-34324, CVE-2023-39189, CVE-2023-45862, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2022-36402, CVE-2023-2007, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-20588, CVE-2023-34319, CVE-2023-40283, CVE-2023-5870, CVE-2023-5868, CVE-2023-5869, CVE-2022-33065, CVE-2023-5217, CVE-2016-3709, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615, CVE-2023-43788, CVE-2023-43789, CVE-2023-45853, CVE-2023-28736, CVE-2023-28938, CVE-2023-4874, CVE-2023-4875, CVE-2021-42782, CVE-2023-40661, CVE-2023-48795, CVE-2022-4304, CVE-2023-0215, CVE-2023-0286, CVE-2023-0464, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-5678, CVE-2023-34059, CVE-2023-20900, CVE-2023-32182, CVE-2022-48565, CVE-2022-48566, CVE-2023-41105, CVE-2023-40217, CVE-2023-37920, CVE-2023-32681, CVE-2023-4641, CVE-2023-2137, CVE-2023-1829, CVE-2023-23559, CVE-2020-18768, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-25433, CVE-2023-26966, CVE-2023-38288, CVE-2023-38289, CVE-2023-23583, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-46246, CVE-2023-43361 | Dell PowerProtect DD Management Center with SmartScale feature | Data Domain Operating System | 7.8 to 7.13 | 8.0.0.10 and above or 7.13.1.0 and above to stay on LTS2024 7.13 or 7.10.1.30 and above to stay on LTS2023 7.10 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
CVEs Addressed | Product | Software/Firmware | Affected Versions | Updated Versions | Link to Update |
---|---|---|---|---|---|
CVE-2024-28973, CVE-2024-29176, CVE-2024-29177, CVE-2024-29173, CVE-2024-29175, CVE-2024-37139, CVE-2024-37140, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-35945, CVE-2023-44487, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-48795, CVE-2023-37920, CVE-2023-45803, CVE-2023-45804, CVE-2023-45853 | Dell PowerProtect DD series appliances, Dell PowerProtect DD Virtual Edition, Dell APEX Protection Storage |
Data Domain Operating System | Versions 7.0 through 7.13 | Version 8.0.0.10 or later, or Version 7.13.1.0 or later to stay on LTS2024 Version 7.13, or 7.10.1.30 or later to stay on LTS2023 Version 7.10, or Version 7.7.5.40 or later to stay on LTS2022 Version 7.7 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
CVE-2024-28973, CVE-2024-29176, CVE-2024-29177, CVE-2024-29173, CVE-2024-29175, CVE-2024-37139, CVE-2024-37140, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-35945, CVE-2023-44487, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-48795, CVE-2023-37920, CVE-2023-45803, CVE-2023-45804, CVE-2023-45853 | PowerProtect Data Manager Appliance model: DM5500 | Data Domain Operating System | Versions prior to 5.16.0.0 | Version 5.16.0.0 or later | Link to download (requires log in to Dell Support) |
CVE-2023-0215, CVE-2022-4450, CVE-2022-4304 | Dell PowerProtect DD appliance models: DD6300, DD6800, and DD9300 | BIOS | Version 7.0 through 7.13 | Version 8.0.0.10 or later, or Version 7.13.1.0 or later to stay on LTS2024 Version 7.13, or Version 7.10.1.30 or later to stay on LTS2023 Version 7.10, or Version 7.7.5.40 or later to stay on LTS2022 Version 7.7 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
CVE-2024-29177, CVE-2024-29174, CVE-2024-29175, CVE-2024-37138, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-44730, CVE-2022-44729, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-28322, CVE-2023-28320, CVE-2023-28321, CVE-2023-46218, CVE-2023-28319, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-30861, CVE-2023-29007, CVE-2023-25652, CVE-2023-23946, CVE-2023-22490, CVE-2022-41953, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-4813, CVE-2023-1972, CVE-2023-1579, CVE-2022-4285, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-4039, CVE-2023-2603, CVE-2022-35206, CVE-2022-44840, CVE-2022-4285, CVE-2022-48065, CVE-2022-48064, CVE-2022-48063, CVE-2023-25585, CVE-2023-25588, CVE-2023-1972, CVE-2023-1579, CVE-2022-35205, CVE-2022-45703, CVE-2021-32256, CVE-2022-47673, CVE-2020-19726, CVE-2022-47695, CVE-2022-47696, CVE-2023-22652, CVE-2023-32181, CVE-2023-30079, CVE-2023-30078, CVE-2023-50495, CVE-2023-35945, CVE-2023-44487, CVE-2023-3817, CVE-2023-5678, CVE-2023-4807, CVE-2023-4016, CVE-2023-40217, CVE-2023-27043, CVE-2023-36632, CVE-2023-2137, CVE-2022-1622, CVE-2023-2731, CVE-2023-26965, CVE-2023-1916, CVE-2022-40090, CVE-2023-4863, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-3138, CVE-2023-43788, CVE-2023-43789, CVE-2023-46228, CVE-2023-35945, CVE-2023-44487, CVE-2022-41741, CVE-2023-44487, CVE-2022-41742, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-31486, CVE-2023-3148, CVE-2023-4863, CVE-2023-44271, CVE-2023-5752, CVE-2023-48795, CVE-2023-37920, CVE-2023-4641, CVE-2023-38286, CVE-2023-45803, CVE-2023-45804, CVE-2023-27522, CVE-2023-46136, CVE-2023-45853 | Dell PowerProtect DD Management Center | Data Domain Operating System | Version 7.0 through 7.13 | Version 8.0.0.10 or later, or Version 7.13.1.0 or later to stay on LTS2024 Version 7.13, or Version 7.10.1.30 or later to stay on LTS2023 Version 7.10, or Version 7.7.5.40 or later to stay on LTS2022 Version 7.7 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
CVE-2024-29177, CVE-2024-29174, CVE-2024-29175, CVE-2024-37138, CVE-2024-37141, CVE-2023-31122, CVE-2023-43622, CVE-2023-45802, CVE-2023-44487, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2023-28708, CVE-2023-46589, CVE-2022-44730, CVE-2022-44729, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-28322, CVE-2023-28320, CVE-2023-28321, CVE-2023-46218, CVE-2023-28319, CVE-2022-43680, CVE-2022-23990, CVE-2022-25313, CVE-2023-30861, CVE-2023-29007, CVE-2023-25652, CVE-2023-23946, CVE-2023-22490, CVE-2022-41953, CVE-2023-32665, CVE-2023-32636, CVE-2023-32611, CVE-2023-29499, CVE-2021-3800, CVE-2021-28153, CVE-2021-27219, CVE-2021-27218, CVE-2020-35457, CVE-2019-13012, CVE-2019-12450, CVE-2023-4813, CVE-2023-1972, CVE-2023-1579, CVE-2022-4285, CVE-2023-30571, CVE-2022-36227, CVE-2021-36976, CVE-2021-31566, CVE-2021-23177, CVE-2023-4039, CVE-2023-2603, CVE-2022-35206, CVE-2022-44840, CVE-2022-4285, CVE-2022-48065, CVE-2022-48064, CVE-2022-48063, CVE-2023-25585, CVE-2023-25588, CVE-2023-1972, CVE-2023-1579, CVE-2022-35205, CVE-2022-45703, CVE-2021-32256, CVE-2022-47673, CVE-2020-19726, CVE-2022-47695, CVE-2022-47696, CVE-2023-22652, CVE-2023-32181, CVE-2023-30079, CVE-2023-30078, CVE-2023-50495, CVE-2023-35945, CVE-2023-44487, CVE-2023-3817, CVE-2023-5678, CVE-2023-4807, CVE-2023-4016, CVE-2023-40217, CVE-2023-27043, CVE-2023-36632, CVE-2023-2137, CVE-2022-1622, CVE-2023-2731, CVE-2023-26965, CVE-2023-1916, CVE-2022-40090, CVE-2023-4863, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-43788, CVE-2023-43789, CVE-2023-46228, CVE-2023-35945, CVE-2023-44487, CVE-2022-41741, CVE-2023-44487, CVE-2022-41742, CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551, CVE-2023-31486, CVE-2023-3148, CVE-2023-4863, CVE-2023-44271, CVE-2023-5752, CVE-2023-37920, CVE-2023-4641, CVE-2023-38286, CVE-2023-45803, CVE-2023-45804, CVE-2023-27522, CVE-2023-46136, CVE-2023-45853, CVE-2023-38473, CVE-2023-3341, CVE-2020-19726, CVE-2021-32256, CVE-2022-4285, CVE-2022-35205, CVE-2022-35206, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-0687, CVE-2023-1579, CVE-2023-1972, CVE-2023-2222, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588, CVE-2022-44638, CVE-2023-4504, CVE-2023-32360, CVE-2023-34241, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-38546, CVE-2023-38545, CVE-2023-28322, CVE-2023-28320, CVE-2023-28321, CVE-2023-46218, CVE-2023-28319, CVE-2023-4039, CVE-2018-9234, CVE-2023-4692, CVE-2023-4693, CVE-2023-31085, CVE-2023-34324, CVE-2023-39189, CVE-2023-45862, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2022-36402, CVE-2023-2007, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-20588, CVE-2023-34319, CVE-2023-40283, CVE-2023-5870, CVE-2023-5868, CVE-2023-5869, CVE-2022-33065, CVE-2023-5217, CVE-2016-3709, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615, CVE-2023-43788, CVE-2023-43789, CVE-2023-45853, CVE-2023-28736, CVE-2023-28938, CVE-2023-4874, CVE-2023-4875, CVE-2021-42782, CVE-2023-40661, CVE-2023-48795, CVE-2022-4304, CVE-2023-0215, CVE-2023-0286, CVE-2023-0464, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-5678, CVE-2023-34059, CVE-2023-20900, CVE-2023-32182, CVE-2022-48565, CVE-2022-48566, CVE-2023-41105, CVE-2023-40217, CVE-2023-37920, CVE-2023-32681, CVE-2023-4641, CVE-2023-2137, CVE-2023-1829, CVE-2023-23559, CVE-2020-18768, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-25433, CVE-2023-26966, CVE-2023-38288, CVE-2023-38289, CVE-2023-23583, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-46246, CVE-2023-43361 | Dell PowerProtect DD Management Center with SmartScale feature | Data Domain Operating System | 7.8 to 7.13 | 8.0.0.10 and above or 7.13.1.0 and above to stay on LTS2024 7.13 or 7.10.1.30 and above to stay on LTS2023 7.10 |
https://www.dell.com/support/kbdoc/334649 https://www.dell.com/support/kbdoc/525902 |
Revision | Date | Description |
---|---|---|
1.0 | 2024-06-24 | Initial Release |
2.0 | 2024-06-24 | Updated for enhanced presentation with no changes to content |
3.0 | 2024-06-26 | Updated Proprietary Code section: Corrected CVSS Base Score from 8.0 to 8.8 for CVE-2024-37140; updated the CVSS Vector String link |
4.0 | 2024-07-23 | Updated Affected Products and Remediation section: PowerProtect DP Series Appliance - IDPA (Integrated Data Protection Appliance): All Models - "Please see note in Affected Products and Remediation Section” |
5.0 | 2024-10-29 | Updated Proprietary Code section: Corrected CVE Description for CVE-2024-29176 |