DSA-2024-022: Security Update for Dell NetWorker vProxy Multiple Component Vulnerabilities
Summary: Dell NetWorker vProxy remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| bind | CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Linux kernel | CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libfastjson | CVE-2020-12762 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| glib2 | CVE-2024-34397 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| ucode-intel | CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| glibc | CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| python | CVE-2022-48560, CVE-2023-27043, CVE-2023-52425, CVE-2024-0450 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| SUSE Manager Client Tools Beta |
CVE-2016-9566, CVE-2019-3698 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| less | CVE-2024-32487 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| krb5 | CVE-2021-37750 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| curl | CVE-2023-38545 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Affected Products & Remediation
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| NetWorker vProxy | vProxy OVA | Versions 19.10 through 19.10.0.3 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.9 through 19.9.0.7 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.8 through 19.8.0.4 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions prior to 19.8 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| NetWorker vProxy | vProxy OVA | Versions 19.10 through 19.10.0.3 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.9 through 19.9.0.7 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.8 through 19.8.0.4 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions prior to 19.8 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Platforms: Windows & Linux (All variants and flavors are impacted)
- Versions prior to 19.8 mean versions 19.7.x, 19.6.x, 19.5.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
- Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
- Dell advises that you consistently upgrade to the most recent release/version of your product.
- The security advisory has been updated in light of the release of Version 19.10.0.4, customers have the option to upgrade to any of the versions/releases specified in the "Affected Products and Remediation" section
- NOTE: Dell NetWorker vProxy 4.4.0-3 OVA is built on SUSE Linux Enterprise Server 15 SP4
Revision History
| Revision | Date | Description |
| 1.0 | 2024-07-03 | Initial Release |
| 2.0 | 2024-07-31 | The security advisory has been updated in light of the release of Version 19.10.0.4 |
Related Information
Legal Disclaimer
Affected Products
NetWorker Family, NetWorker, NetWorker Series, NetWorker Module, Product Security InformationArticle Properties
Article Number: 000226633
Article Type: Dell Security Advisory
Last Modified: 09 Sep 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.