DSA-2024-369: Security Update for Dell RecoverPoint for Virtual Machines Multiple Vulnerabilities
Summary: Dell RecoverPoint for Virtual Machines remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| Bind9 | CVE-2023-2828, CVE-2021-25216 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| OpenSSH | CVE-2023-51385, CVE-2023-51767, CVE-2021-28041 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| gnutls | CVE-2021-20231, CVE-2021-20232 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| vim | CVE-2021-3872, CVE-2021-3903, CVE-2021-3927, CVE-2021-3928, CVE-2021-3973, CVE-2021-3974, CVE-2021-4019, CVE-2021-4136, CVE-2021-4166, CVE-2021-4192, CVE-2022-0261, CVE-2022-0318, CVE-2022-0351, CVE-2022-0361, CVE-2022-0413, CVE-2021-4069 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Rpm | CVE-2021-20266, CVE-2021-20271, CVE-2021-3421 |
See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| nginx | CVE-2022-41741, CVE-2022-41742 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| open-vm-tools | CVE-2022-31676 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Kernel-default | CVE-2021-39713 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Linux | CVE-2022-39188, CVE-2022-40307, CVE-2022-1679, CVE-2022-2588, CVE-2022-33742, CVE-2022-33741, CVE-2022-3028, CVE-2022-2663, CVE-2021-33656, CVE-2022-2318, CVE-2021-4159, CVE-2021-43267, CVE-2022-33740, CVE-2022-26365, CVE-2021-33655, CVE-2022-36879, CVE-2022-2153, CVE-2022-33744, CVE-2022-2586, CVE-2022-36946, CVE-2022-39842, CVE-2022-1462 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libssh2 |
CVE-2019-17498, CVE-2023-48795 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Apache Tomcat |
CVE-2023-28708, CVE-2023-42795, CVE-2023-44487, CVE-2023-45648, CVE-2023-46589 CVE-2022-34305, CVE-2022-42252, CVE-2023-24998, CVE-2023-41080, CVE-2022-29885, CVE-2021-43980 |
See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libcurl | CVE-2023-38545 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| sqlite3 | CVE-2020-35525, CVE-2020-35527 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Python | CVE-2021-3177, CVE-2022-37454 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Zlib | CVE-2022-37434 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Exim4 | CVE-2022-37452 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Grub2 | CVE-2022-2601, CVE-2022-3775 | See NVD link below for individual score for each CVE. http://nvd.nist.gov/ |
| SLES Package Updates | CVE-2018-7738, CVE-2022-3479, CVE-2023-26604, CVE-2015-8985, CVE-2022-3554, CVE-2022-2928, CVE-2022-3597, CVE-2022-3821, CVE-2018-18586, CVE-2019-2708, CVE-2022-42010, CVE-2022-21619, CVE-2021-42523, CVE-2022-43552, CVE-2017-17087, CVE-2017-5953, CVE-2021-3778, CVE-2022-47629, CVE-2022-4415, CVE-2022-3570, CVE-2022-3598, CVE-2022-44792, CVE-2022-44793, CVE-2022-40897, CVE-2022-23491, CVE-2022-3479, CVE-2022-48281, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-23916, CVE-2023-21830, CVE-2023-21843, CVE-2022-48303, CVE-2022-21216, CVE-2022-33196, CVE-2022-38090, CVE-2022-3555, CVE-2023-28486, CVE-2023-28487, CVE-2023-0922, CVE-2023-0465, CVE-2023-25193, CVE-2023-1981, CVE-2023-28484, CVE-2023-29469, CVE-2023-29383, CVE-2023-29491, CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554, CVE-2022-27774, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2022-33972, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0799, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2023-2650, CVE-2023-32324, CVE-2022-45154, CVE-2023-20867, CVE-2023-26555, CVE-2022-4304, CVE-2023-34969, CVE-2022-2127, CVE-2023-34966, CVE-2023-34967, CVE-2023-34968, CVE-2023-38408, CVE-2023-20593, CVE-2023-3446, CVE-2023-3817, CVE-2023-20569, CVE-2022-40982, CVE-2022-41804, CVE-2023-23908, CVE-2023-36054, CVE-2023-0459, CVE-2023-2156, CVE-2023-2985, CVE-2023-3117, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-22045, CVE-2023-22049, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2023-4016, CVE-2023-20900, CVE-2023-4039, CVE-2016-3709, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615, CVE-2023-38039, CVE-2020-19726, CVE-2021-32256, CVE-2022-35205, CVE-2022-35206, CVE-2022-4285, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-0687, CVE-2023-1579, CVE-2023-1972, CVE-2023-2222, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-32360, CVE-2023-34241, CVE-2023-4504, CVE-2023-40217, CVE-2023-32182, CVE-2023-3341, CVE-2023-35945, CVE-2018-9234, CVE-2023-41105, CVE-2023-5217, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2023-43788, CVE-2023-43789, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2022-48565, CVE-2022-48566, CVE-2023-4641, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-4091, CVE-2023-38546, CVE-2023-4692, CVE-2023-4693, CVE-2023-1829, CVE-2023-23559, CVE-2022-0359, CVE-2022-0361, CVE-2022-0392, CVE-2022-1616 | See SuSE link below for individual scores for CVE. https://www.suse.com/ |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2024-22426 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-22425 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains a brute force/dictionary attack vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to launch a brute force attack or a dictionary attack against the RecoverPoint login form. This allows attackers to brute-force the password of valid users in an automated manner. | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2024-22426 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-22425 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains a brute force/dictionary attack vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to launch a brute force attack or a dictionary attack against the RecoverPoint login form. This allows attackers to brute-force the password of valid users in an automated manner. | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
Affected Products & Remediation
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| RecoverPoint for Virtual Machines | Version 6.0.SP1 | Version 6.0.SP1.P1 | https://www.dell.com/support/home/product-support/product/recoverpoint-for-virtual-machines/drivers |
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| RecoverPoint for Virtual Machines | Version 6.0.SP1 | Version 6.0.SP1.P1 | https://www.dell.com/support/home/product-support/product/recoverpoint-for-virtual-machines/drivers |
NOTE: CVE-2024-22426 & CVE-2024-22425 were also addressed in the RP4VM 5.3.4 release, which corresponds to DSA-2024-092
Revision History
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-08-29 | Initial Publication |
| 2.0 | 2024-09-03 | Updated Advisory with a NOTE: CVE-2024-22426 & CVE-2024-22425 were also addressed in the RP4VM 5.3.4 release, which corresponds to DSA-2024-092 |
Related Information
Legal Disclaimer
Affected Products
RecoverPoint, Product Security Information, RecoverPoint, RecoverPoint virtual applianceArticle Properties
Article Number: 000228154
Article Type: Dell Security Advisory
Last Modified: 09 Sep 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.