DSA-2024-395: Security Update for Dell Data Protection Central for Third-Party Component Vulnerabilities.

Summary: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

Critical

Additional Details

This Security Advisory applies to Data Protection Central versions 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x. This Security Advisory applies to IDPA version 2.7.7.

Details

Third-party Component CVEs  More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2013-4235 ,CVE-2017-9271, CVE-2020-10135, CVE-2020-12912, CVE-2020-26558, CVE-2020-8694, CVE-2021-0129, CVE-2021-37750, CVE-2021-43389, CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47103, CVE-2021-47113, CVE-2021-47131, CVE-2021-47145, CVE-2021-47191, CVE-2021-47193, CVE-2021-47194, CVE-2021-47201, CVE-2021-47206, CVE-2021-47219, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248,CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47267 CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47293, CVE-2021-47294, CVE-2021-47295, CVE-2021-47297, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47309, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47328, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47354, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47372, CVE-2021-47375, CVE-2021-47378, CVE-2021-47379, CVE-2021-47382, CVE-2021-47383, CVE-2021-47388, CVE-2021-47391, CVE-2021-47395, CVE-2021-47397, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47407, CVE-2021-47409, CVE-2021-47416, CVE-2021-47418, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47438, CVE-2021-47441, CVE-2021-47445, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47468, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496 , CVE-2021-47497, CVE-2021-47498, CVE-2021-47500, CVE-2021-47501, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47523, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47547, CVE-2021-47548, CVE-2021-47559, CVE-2021-47565, CVE-2021-47566, CVE-2021-47571, CVE-2021-47576, CVE-2021-47580, CVE-2021-47582, CVE-2021-47587, CVE-2021-47588, CVE-2021-47589, CVE-2021-47597, CVE-2021-47599, CVE-2021-47600, CVE-2021-47602, CVE-2021-47603, CVE-2021-47606, CVE-2021-47609, CVE-2021-47617, CVE-2021-47619, CVE-2022-0435, CVE-2022-20368, CVE-2022-22942, CVE-2022-28506, CVE-2022-28748, CVE-2022-48560, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2022-48715, CVE-2022-48722, CVE-2022-48732, CVE-2022-48733, CVE-2022-48740, CVE-2022-48743, CVE-2022-48754, CVE-2022-48756, CVE-2022-48758, CVE-2022-48759, CVE-2022-48760, CVE-2022-48761, CVE-2022-48772, CVE-2022-48775, CVE-2022-48792, CVE-2022-48794, CVE-2022-48804, CVE-2022-48810, CVE-2022-48811, CVE-2022-48823, CVE-2022-48826, CVE-2022-48827, CVE-2022-48828, CVE-2022-48829, CVE-2022-48836, CVE-2022-48850, CVE-2022-48855, CVE-2022-48857, CVE-2022-48860, CVE-2022-48863, CVE-2023-24023, CVE-2023-39742, CVE-2023-42667, CVE-2023-42755, CVE-2023-4408, CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-49141, CVE-2023-50387, CVE-2023-50868, CVE-2023-52425, CVE-2023-52435, CVE-2023-52507, CVE-2023-52527, CVE-2023-52586, CVE-2023-52594, CVE-2023-52612, CVE-2023-52615, CVE-2023-52619, CVE-2023-52622, CVE-2023-52623, CVE-2023-52655, CVE-2023-52664, CVE-2023-52669, CVE-2023-52675, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52693, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52737, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52747, CVE-2023-52752, CVE-2023-52753, CVE-2023-52754, CVE-2023-52757, CVE-2023-52759, CVE-2023-52762, CVE-2023-52764, CVE-2023-52774, CVE-2023-52781, CVE-2023-52784, CVE-2023-52796, CVE-2023-52803, CVE-2023-52808, CVE-2023-52809, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52832, CVE-2023-52834, CVE-2023-52835, CVE-2023-52843, CVE-2023-52845, CVE-2023-52855, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2023-52881, CVE-2023-52885, CVE-2024-0397, CVE-2024-0450, CVE-2024-0639, CVE-2024-1737, CVE-2024-1975, CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147, CVE-2024-23651, CVE-2024-23652, CVE-2024-23653, CVE-2024-24577, CVE-2024-24853, CVE-2024-24980, CVE-2024-2511, CVE-2024-25939, CVE-2024-26615, CVE-2024-26625, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26641, CVE-2024-26659, CVE-2024-26663, CVE-2024-26679, CVE-2024-26687, CVE-2024-26720, CVE-2024-26735, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26813, CVE-2024-26828, CVE-2024-26830, CVE-2024-26845, CVE-2024-26846, CVE-2024-26863, CVE-2024-26874, CVE-2024-26876, CVE-2024-26880, CVE-2024-26894, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26923, CVE-2024-26924, CVE-2024-26928, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26973, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27019, CVE-2024-27020, CVE-2024-27025, CVE-2024-27059, CVE-2024-27062, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27401, CVE-2024-27410, CVE-2024-27419, CVE-2024-27436, CVE-2024-27437, CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-34459, CVE-2024-35247, CVE-2024-35789, CVE-2024-35791, CVE-2024-35805, CVE-2024-35807, CVE-2024-35809, CVE-2024-35819, CVE-2024-35822, CVE-2024-35828, CVE-2024-35830, CVE-2024-35835, CVE-2024-35837, CVE-2024-35849, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35867, CVE-2024-35868, CVE-2024-35870, CVE-2024-35877, CVE-2024-35878, CVE-2024-35886, CVE-2024-35887, CVE-2024-35893, CVE-2024-35896, CVE-2024-35922, CVE-2024-35925, CVE-2024-35930, CVE-2024-35932, CVE-2024-35934, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35947, CVE-2024-35949, CVE-2024-35950, CVE-2024-35955, CVE-2024-35956, CVE-2024-35958, CVE-2024-35960, CVE-2024-35966, CVE-2024-35969, CVE-2024-35976, CVE-2024-35978, CVE-2024-35979, CVE-2024-35982, CVE-2024-35984, CVE-2024-35995, CVE-2024-35997, CVE-2024-35998, CVE-2024-36004, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36017, CVE-2024-36025, CVE-2024-36029, CVE-2024-36288, CVE-2024-36479, CVE-2024-36592, CVE-2024-36880, CVE-2024-36894, CVE-2024-36901, CVE-2024-36902, CVE-2024-36915, CVE-2024-36917, CVE-2024-36919, CVE-2024-36923, CVE-2024-36924, CVE-2024-36934, CVE-2024-36938, CVE-2024-36939, CVE-2024-36940, CVE-2024-36941, CVE-2024-36949, CVE-2024-36950, CVE-2024-36960, CVE-2024-36964, CVE-2024-37021, CVE-2024-37354, CVE-2024-37370, CVE-2024-37371, CVE-2024-38544, CVE-2024-38545, CVE-2024-38546, CVE-2024-38549, CVE-2024-38552, CVE-2024-38553, CVE-2024-38558, CVE-2024-38560, CVE-2024-38565, CVE-2024-38567, CVE-2024-38578, CVE-2024-38579, CVE-2024-38580, CVE-2024-38597, CVE-2024-38598, CVE-2024-38601, CVE-2024-38608, CVE-2024-38618, CVE-2024-38619, CVE-2024-38621, CVE-2024-38627, CVE-2024-38630, CVE-2024-38659, CVE-2024-38661, CVE-2024-38780, CVE-2024-39301, CVE-2024-39475, CVE-2024-39487, CVE-2024-39488, CVE-2024-39490, CVE-2024-39494, CVE-2024-39499, CVE-2024-39501, CVE-2024-39506, CVE-2024-39507, CVE-2024-39509, CVE-2024-4032, CVE-2024-40901, CVE-2024-40904, CVE-2024-40912, CVE-2024-40923, CVE-2024-40929, CVE-2024-40932, CVE-2024-40937, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40953, CVE-2024-40959, CVE-2024-40966, CVE-2024-40967, CVE-2024-40978, CVE-2024-40982, CVE-2024-40987, CVE-2024-40988, CVE-2024-40990, CVE-2024-40995, CVE-2024-40998, CVE-2024-40999, CVE-2024-41014, CVE-2024-41015, CVE-2024-41016, CVE-2024-41044, CVE-2024-41048, CVE-2024-41059, CVE-2024-41060, CVE-2024-41063, CVE-2024-41064, CVE-2024-41066, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41076, CVE-2024-41078, CVE-2024-41081, CVE-2024-41089, CVE-2024-41090, CVE-2024-41091, CVE-2024-41095, CVE-2024-41110, CVE-2024-42070, CVE-2024-42093, CVE-2024-42096, CVE-2024-42119, CVE-2024-42120, CVE-2024-42124, CVE-2024-42145, CVE-2024-42223, CVE-2024-42224, CVE-2024-4741, CVE-2024-5535, CVE-2024-6345, CVE-2024-7264 https://www.suse.com/security/cve/ This hyperlink is taking you to a website outside of Dell Technologies.
 

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central DPC-OSupdate Versions prior to 1.1.19-1 Version 1.1.20-1 Apply Latest Data Protection Central OS Update
PowerProtect DP Series

(Integrated Data Protection Appliance (IDPA) Appliance
DPC-OSupdate for Power Protect DP Series Appliances Versions prior to 1.1.19-1 Version 1.1.20-1 Apply Latest Data Protection Central OS Update
Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central DPC-OSupdate Versions prior to 1.1.19-1 Version 1.1.20-1 Apply Latest Data Protection Central OS Update
PowerProtect DP Series

(Integrated Data Protection Appliance (IDPA) Appliance
DPC-OSupdate for Power Protect DP Series Appliances Versions prior to 1.1.19-1 Version 1.1.20-1 Apply Latest Data Protection Central OS Update
  1. Platform: SUSE Linux Enterprise Server 12 SP5
  2. To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
  3. The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.20-1
To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.

See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers (Link will be updated once the release is done)
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs (Link will be updated once the release is done)

The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:
version=1.1.20-1


NOTE: To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer Article: 000228487, before applying the update.

Revision History

RevisionDateDescription
1.02024-09-11Initial Release
2.02024-10-25Updated for enhanced presentation with no changes to content.


 

Related Information

Affected Products

Data Protection Central, PowerProtect Data Protection Appliance, Data Protection Central, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware , Integrated Data Protection Appliance Software ...
Article Properties
Article Number: 000228490
Article Type: Dell Security Advisory
Last Modified: 25 Oct 2024
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.