DSA-2024-395: Security Update for Dell Data Protection Central for Third-Party Component Vulnerabilities.
Summary: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Additional Details
This Security Advisory applies to Data Protection Central versions 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x. This Security Advisory applies to IDPA version 2.7.7.
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| SUSE Linux Enterprise Server 12 SP5 | CVE-2013-4235 ,CVE-2017-9271, CVE-2020-10135, CVE-2020-12912, CVE-2020-26558, CVE-2020-8694, CVE-2021-0129, CVE-2021-37750, CVE-2021-43389, CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47103, CVE-2021-47113, CVE-2021-47131, CVE-2021-47145, CVE-2021-47191, CVE-2021-47193, CVE-2021-47194, CVE-2021-47201, CVE-2021-47206, CVE-2021-47219, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248,CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47267 CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47293, CVE-2021-47294, CVE-2021-47295, CVE-2021-47297, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47309, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47328, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47354, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47372, CVE-2021-47375, CVE-2021-47378, CVE-2021-47379, CVE-2021-47382, CVE-2021-47383, CVE-2021-47388, CVE-2021-47391, CVE-2021-47395, CVE-2021-47397, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47407, CVE-2021-47409, CVE-2021-47416, CVE-2021-47418, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47438, CVE-2021-47441, CVE-2021-47445, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47468, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496 , CVE-2021-47497, CVE-2021-47498, CVE-2021-47500, CVE-2021-47501, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47523, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47547, CVE-2021-47548, CVE-2021-47559, CVE-2021-47565, CVE-2021-47566, CVE-2021-47571, CVE-2021-47576, CVE-2021-47580, CVE-2021-47582, CVE-2021-47587, CVE-2021-47588, CVE-2021-47589, CVE-2021-47597, CVE-2021-47599, CVE-2021-47600, CVE-2021-47602, CVE-2021-47603, CVE-2021-47606, CVE-2021-47609, CVE-2021-47617, CVE-2021-47619, CVE-2022-0435, CVE-2022-20368, CVE-2022-22942, CVE-2022-28506, CVE-2022-28748, CVE-2022-48560, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2022-48715, CVE-2022-48722, CVE-2022-48732, CVE-2022-48733, CVE-2022-48740, CVE-2022-48743, CVE-2022-48754, CVE-2022-48756, CVE-2022-48758, CVE-2022-48759, CVE-2022-48760, CVE-2022-48761, CVE-2022-48772, CVE-2022-48775, CVE-2022-48792, CVE-2022-48794, CVE-2022-48804, CVE-2022-48810, CVE-2022-48811, CVE-2022-48823, CVE-2022-48826, CVE-2022-48827, CVE-2022-48828, CVE-2022-48829, CVE-2022-48836, CVE-2022-48850, CVE-2022-48855, CVE-2022-48857, CVE-2022-48860, CVE-2022-48863, CVE-2023-24023, CVE-2023-39742, CVE-2023-42667, CVE-2023-42755, CVE-2023-4408, CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-49141, CVE-2023-50387, CVE-2023-50868, CVE-2023-52425, CVE-2023-52435, CVE-2023-52507, CVE-2023-52527, CVE-2023-52586, CVE-2023-52594, CVE-2023-52612, CVE-2023-52615, CVE-2023-52619, CVE-2023-52622, CVE-2023-52623, CVE-2023-52655, CVE-2023-52664, CVE-2023-52669, CVE-2023-52675, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52693, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52737, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52747, CVE-2023-52752, CVE-2023-52753, CVE-2023-52754, CVE-2023-52757, CVE-2023-52759, CVE-2023-52762, CVE-2023-52764, CVE-2023-52774, CVE-2023-52781, CVE-2023-52784, CVE-2023-52796, CVE-2023-52803, CVE-2023-52808, CVE-2023-52809, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52832, CVE-2023-52834, CVE-2023-52835, CVE-2023-52843, CVE-2023-52845, CVE-2023-52855, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2023-52881, CVE-2023-52885, CVE-2024-0397, CVE-2024-0450, CVE-2024-0639, CVE-2024-1737, CVE-2024-1975, CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147, CVE-2024-23651, CVE-2024-23652, CVE-2024-23653, CVE-2024-24577, CVE-2024-24853, CVE-2024-24980, CVE-2024-2511, CVE-2024-25939, CVE-2024-26615, CVE-2024-26625, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26641, CVE-2024-26659, CVE-2024-26663, CVE-2024-26679, CVE-2024-26687, CVE-2024-26720, CVE-2024-26735, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26813, CVE-2024-26828, CVE-2024-26830, CVE-2024-26845, CVE-2024-26846, CVE-2024-26863, CVE-2024-26874, CVE-2024-26876, CVE-2024-26880, CVE-2024-26894, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26923, CVE-2024-26924, CVE-2024-26928, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26973, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27019, CVE-2024-27020, CVE-2024-27025, CVE-2024-27059, CVE-2024-27062, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27401, CVE-2024-27410, CVE-2024-27419, CVE-2024-27436, CVE-2024-27437, CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-34459, CVE-2024-35247, CVE-2024-35789, CVE-2024-35791, CVE-2024-35805, CVE-2024-35807, CVE-2024-35809, CVE-2024-35819, CVE-2024-35822, CVE-2024-35828, CVE-2024-35830, CVE-2024-35835, CVE-2024-35837, CVE-2024-35849, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35867, CVE-2024-35868, CVE-2024-35870, CVE-2024-35877, CVE-2024-35878, CVE-2024-35886, CVE-2024-35887, CVE-2024-35893, CVE-2024-35896, CVE-2024-35922, CVE-2024-35925, CVE-2024-35930, CVE-2024-35932, CVE-2024-35934, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35947, CVE-2024-35949, CVE-2024-35950, CVE-2024-35955, CVE-2024-35956, CVE-2024-35958, CVE-2024-35960, CVE-2024-35966, CVE-2024-35969, CVE-2024-35976, CVE-2024-35978, CVE-2024-35979, CVE-2024-35982, CVE-2024-35984, CVE-2024-35995, CVE-2024-35997, CVE-2024-35998, CVE-2024-36004, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36017, CVE-2024-36025, CVE-2024-36029, CVE-2024-36288, CVE-2024-36479, CVE-2024-36592, CVE-2024-36880, CVE-2024-36894, CVE-2024-36901, CVE-2024-36902, CVE-2024-36915, CVE-2024-36917, CVE-2024-36919, CVE-2024-36923, CVE-2024-36924, CVE-2024-36934, CVE-2024-36938, CVE-2024-36939, CVE-2024-36940, CVE-2024-36941, CVE-2024-36949, CVE-2024-36950, CVE-2024-36960, CVE-2024-36964, CVE-2024-37021, CVE-2024-37354, CVE-2024-37370, CVE-2024-37371, CVE-2024-38544, CVE-2024-38545, CVE-2024-38546, CVE-2024-38549, CVE-2024-38552, CVE-2024-38553, CVE-2024-38558, CVE-2024-38560, CVE-2024-38565, CVE-2024-38567, CVE-2024-38578, CVE-2024-38579, CVE-2024-38580, CVE-2024-38597, CVE-2024-38598, CVE-2024-38601, CVE-2024-38608, CVE-2024-38618, CVE-2024-38619, CVE-2024-38621, CVE-2024-38627, CVE-2024-38630, CVE-2024-38659, CVE-2024-38661, CVE-2024-38780, CVE-2024-39301, CVE-2024-39475, CVE-2024-39487, CVE-2024-39488, CVE-2024-39490, CVE-2024-39494, CVE-2024-39499, CVE-2024-39501, CVE-2024-39506, CVE-2024-39507, CVE-2024-39509, CVE-2024-4032, CVE-2024-40901, CVE-2024-40904, CVE-2024-40912, CVE-2024-40923, CVE-2024-40929, CVE-2024-40932, CVE-2024-40937, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40953, CVE-2024-40959, CVE-2024-40966, CVE-2024-40967, CVE-2024-40978, CVE-2024-40982, CVE-2024-40987, CVE-2024-40988, CVE-2024-40990, CVE-2024-40995, CVE-2024-40998, CVE-2024-40999, CVE-2024-41014, CVE-2024-41015, CVE-2024-41016, CVE-2024-41044, CVE-2024-41048, CVE-2024-41059, CVE-2024-41060, CVE-2024-41063, CVE-2024-41064, CVE-2024-41066, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41076, CVE-2024-41078, CVE-2024-41081, CVE-2024-41089, CVE-2024-41090, CVE-2024-41091, CVE-2024-41095, CVE-2024-41110, CVE-2024-42070, CVE-2024-42093, CVE-2024-42096, CVE-2024-42119, CVE-2024-42120, CVE-2024-42124, CVE-2024-42145, CVE-2024-42223, CVE-2024-42224, CVE-2024-4741, CVE-2024-5535, CVE-2024-6345, CVE-2024-7264 | https://www.suse.com/security/cve/ |
Affected Products & Remediation
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | DPC-OSupdate | Versions prior to 1.1.19-1 | Version 1.1.20-1 | Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance |
DPC-OSupdate for Power Protect DP Series Appliances | Versions prior to 1.1.19-1 | Version 1.1.20-1 | Apply Latest Data Protection Central OS Update |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | DPC-OSupdate | Versions prior to 1.1.19-1 | Version 1.1.20-1 | Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance |
DPC-OSupdate for Power Protect DP Series Appliances | Versions prior to 1.1.19-1 | Version 1.1.20-1 | Apply Latest Data Protection Central OS Update |
- Platform: SUSE Linux Enterprise Server 12 SP5
- To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
- The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.20-1
See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers (Link will be updated once the release is done)
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs (Link will be updated once the release is done)
The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:
version=1.1.20-1
NOTE: To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer Article: 000228487, before applying the update.
Revision History
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-09-11 | Initial Release |
| 2.0 | 2024-10-25 | Updated for enhanced presentation with no changes to content. |
Related Information
Legal Disclaimer
Affected Products
Data Protection Central, PowerProtect Data Protection Appliance, Data Protection Central, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware
, Integrated Data Protection Appliance Software
...
Article Properties
Article Number: 000228490
Article Type: Dell Security Advisory
Last Modified: 25 Oct 2024
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.