Critical
Third-party Component | CVEs | More Information |
---|---|---|
Bind9 | CVE-2023-2828, CVE-2021-25216 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
OpenSSH | CVE-2023-51385, CVE-2023-51767, CVE-2021-28041 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
gnutls | CVE-2021-20231, CVE-2021-20232 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
vim | CVE-2021-3872, CVE-2021-3903, CVE-2021-3927, CVE-2021-3928, CVE-2021-3973, CVE-2021-3974, CVE-2021-4019, CVE-2021-4136, CVE-2021-4166, CVE-2021-4192, CVE-2022-0261, CVE-2022-0318, CVE-2022-0351, CVE-2022-0361, CVE-2022-0413, CVE-2021-4069 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Rpm | CVE-2021-20266, CVE-2021-20271, CVE-2021-3421 |
See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
nginx | CVE-2022-41741, CVE-2022-41742 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
open-vm-tools | CVE-2022-31676 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Kernel-default | CVE-2021-39713 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Linux | CVE-2022-39188, CVE-2022-40307, CVE-2022-1679, CVE-2022-2588, CVE-2022-33742, CVE-2022-33741, CVE-2022-3028, CVE-2022-2663, CVE-2021-33656, CVE-2022-2318, CVE-2021-4159, CVE-2021-43267, CVE-2022-33740, CVE-2022-26365, CVE-2021-33655, CVE-2022-36879, CVE-2022-2153, CVE-2022-33744, CVE-2022-2586, CVE-2022-36946, CVE-2022-39842, CVE-2022-1462 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
libssh2 |
CVE-2019-17498, CVE-2023-48795 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Apache Tomcat |
CVE-2023-28708, CVE-2023-42795, CVE-2023-44487, CVE-2023-45648, CVE-2023-46589 CVE-2022-34305, CVE-2022-42252, CVE-2023-24998, CVE-2023-41080, CVE-2022-29885, CVE-2021-43980 |
See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
libcurl | CVE-2023-38545 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
sqlite3 | CVE-2020-35525, CVE-2020-35527 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Python | CVE-2021-3177, CVE-2022-37454 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Zlib | CVE-2022-37434 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Exim4 | CVE-2022-37452 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Grub2 | CVE-2022-2601, CVE-2022-3775 | See NVD link below for individual score for each CVE. http://nvd.nist.gov/ |
SLES Package Updates | CVE-2018-7738, CVE-2022-3479, CVE-2023-26604, CVE-2015-8985, CVE-2022-3554, CVE-2022-2928, CVE-2022-3597, CVE-2022-3821, CVE-2018-18586, CVE-2019-2708, CVE-2022-42010, CVE-2022-21619, CVE-2021-42523, CVE-2022-43552, CVE-2017-17087, CVE-2017-5953, CVE-2021-3778, CVE-2022-47629, CVE-2022-4415, CVE-2022-3570, CVE-2022-3598, CVE-2022-44792, CVE-2022-44793, CVE-2022-40897, CVE-2022-23491, CVE-2022-3479, CVE-2022-48281, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-23916, CVE-2023-21830, CVE-2023-21843, CVE-2022-48303, CVE-2022-21216, CVE-2022-33196, CVE-2022-38090, CVE-2022-3555, CVE-2023-28486, CVE-2023-28487, CVE-2023-0922, CVE-2023-0465, CVE-2023-25193, CVE-2023-1981, CVE-2023-28484, CVE-2023-29469, CVE-2023-29383, CVE-2023-29491, CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554, CVE-2022-27774, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2022-33972, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0799, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2023-2650, CVE-2023-32324, CVE-2022-45154, CVE-2023-20867, CVE-2023-26555, CVE-2022-4304, CVE-2023-34969, CVE-2022-2127, CVE-2023-34966, CVE-2023-34967, CVE-2023-34968, CVE-2023-38408, CVE-2023-20593, CVE-2023-3446, CVE-2023-3817, CVE-2023-20569, CVE-2022-40982, CVE-2022-41804, CVE-2023-23908, CVE-2023-36054, CVE-2023-0459, CVE-2023-2156, CVE-2023-2985, CVE-2023-3117, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-22045, CVE-2023-22049, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2023-4016, CVE-2023-20900, CVE-2023-4039, CVE-2016-3709, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615, CVE-2023-38039, CVE-2020-19726, CVE-2021-32256, CVE-2022-35205, CVE-2022-35206, CVE-2022-4285, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-0687, CVE-2023-1579, CVE-2023-1972, CVE-2023-2222, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-32360, CVE-2023-34241, CVE-2023-4504, CVE-2023-40217, CVE-2023-32182, CVE-2023-3341, CVE-2023-35945, CVE-2018-9234, CVE-2023-41105, CVE-2023-5217, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2023-43788, CVE-2023-43789, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2022-48565, CVE-2022-48566, CVE-2023-4641, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-4091, CVE-2023-38546, CVE-2023-4692, CVE-2023-4693, CVE-2023-1829, CVE-2023-23559, CVE-2022-0359, CVE-2022-0361, CVE-2022-0392, CVE-2022-1616 | See SuSE link below for individual scores for CVE. https://www.suse.com/ |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-22426 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-22425 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains a brute force/dictionary attack vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to launch a brute force attack or a dictionary attack against the RecoverPoint login form. This allows attackers to brute-force the password of valid users in an automated manner. | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-22426 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-22425 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains a brute force/dictionary attack vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to launch a brute force attack or a dictionary attack against the RecoverPoint login form. This allows attackers to brute-force the password of valid users in an automated manner. | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
Product | Affected Versions | Remediated Versions | Link |
---|---|---|---|
RecoverPoint for Virtual Machines | Version 6.0.SP1 | Version 6.0.SP1.P1 | https://www.dell.com/support/home/product-support/product/recoverpoint-for-virtual-machines/drivers |
Product | Affected Versions | Remediated Versions | Link |
---|---|---|---|
RecoverPoint for Virtual Machines | Version 6.0.SP1 | Version 6.0.SP1.P1 | https://www.dell.com/support/home/product-support/product/recoverpoint-for-virtual-machines/drivers |
Revision | Date | Description |
---|---|---|
1.0 | 2024-08-29 | Initial Publication |
2.0 | 2024-09-03 | Updated Advisory with a NOTE: CVE-2024-22426 & CVE-2024-22425 were also addressed in the RP4VM 5.3.4 release, which corresponds to DSA-2024-092 |