DSA-2025-075: Security Update for Dell Data Protection Advisor for Multiple Component Vulnerabilities
Summary: Dell Data Protection Advisor remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system.
Impact
Critical
Details
|
Third-party Component |
CVEs |
More Information |
|
Apache Avro |
CVE-2021-43045, CVE-2023-39410 |
|
|
Apache commons collections |
CVE-2015-7501 |
https://nvd.nist.gov/vuln/search |
|
Apache commons compress |
CVE-2023-42503, CVE-2024-25710, CVE-2024-26308 |
https://nvd.nist.gov/vuln/search |
|
Apache Mina SSHD :: Common support utilities |
CVE-2022-45047 |
https://nvd.nist.gov/vuln/search |
|
Apache Mina SSHD :: Core |
CVE-2021-30129, CVE-2023-35887, CVE-2023-48795 |
https://nvd.nist.gov/vuln/search |
|
Apache Tomcat |
CVE-2021-24122, CVE-2021-30640, CVE-2021-33037, CVE-2022-34305, CVE-2020-9484, CVE-2020-17527, CVE-2021-25122, CVE-2021-25329, CVE-2021-30639,CVE-2021-41079, CVE-2022-23181, CVE-2022-29885, CVE-2022-25762, CVE-2022-42252, CVE-2023-46589, CVE-2021-43980, CVE-2023-28708, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2024-21733 |
https://nvd.nist.gov/vuln/search |
|
Apache Velocity |
CVE-2020-13936 |
https://nvd.nist.gov/vuln/search |
|
Apache Xerces |
CVE-2022-23437 |
https://nvd.nist.gov/vuln/search |
|
Curl |
CVE-2023-38545 |
|
|
Dom4j |
CVE-2020-10683 |
|
|
Google-guava |
CVE-2023-2976, CVE-2020-8908 |
https://nvd.nist.gov/vuln/search |
|
H2 Database Engine |
CVE-2022-45868 |
https://nvd.nist.gov/vuln/search |
|
Java SE: 8u421 |
CVE-2024-21235, CVE-2024-21217, CVE-2024-21210, CVE-2024-21208 |
https://nvd.nist.gov/vuln/search |
|
Jboss REST Easy |
CVE-2016-9606, CVE-2020-25633 |
https://nvd.nist.gov/vuln/search |
|
Jettison |
CVE-2022-40149, CVE-2022-40150, CVE-2022-45685, CVE-2022-45693, CVE-2023-1436 |
https://nvd.nist.gov/vuln/search |
|
JGit |
CVE-2023-4759 |
https://nvd.nist.gov/vuln/search |
|
Jsoup |
CVE-2021-37714, CVE-2022-36033 |
https://nvd.nist.gov/vuln/search |
|
libcurl |
CVE-2023-27537, CVE-2023-38039 |
|
|
MySql Connector |
CVE-2023-22102, CVE-2023-21971 |
https://nvd.nist.gov/vuln/search |
|
okHttp |
CVE-2018-20200 |
https://nvd.nist.gov/vuln/search |
|
PostgreSQL driver |
CVE-2024-1597 |
https://nvd.nist.gov/vuln/search |
|
Slf4j_ext |
CVE-2018-8088 |
https://nvd.nist.gov/vuln/search |
|
SnakeYaml |
CVE-2022-41854, CVE-2022-38750,CVE-2022-38751, CVE-2022-38749, CVE-2022-25857, CVE-2022-1471, CVE-2022-38752 |
|
|
SSH |
CVE-2023-46445, CVE-2023-46446 |
https://nvd.nist.gov/vuln/search
|
|
Wildfly |
CVE-2020-14338 |
https://nvd.nist.gov/vuln/search |
|
XML External Entity |
CVE-2014-3530 |
https://nvd.nist.gov/vuln/search |
Affected Products & Remediation
|
Product |
Affected Versions |
Remediated Versions |
Link to Update |
|
Data Protection Advisor |
Versions 19.9, 19.10 and 19.11 |
Version 19.12 or later |
|
Product |
Affected Versions |
Remediated Versions |
Link to Update |
|
Data Protection Advisor |
Versions 19.9, 19.10 and 19.11 |
Version 19.12 or later |
Notes:
- Dell recommends that you always upgrade to the latest release/version for your product.
- To request the workaround files that remove the affected OpenSSL-dependent libraries, or to receive assistance with applying the workaround, please contact Dell Customer Support.
Workarounds & Mitigations
|
CVE ID |
Workaround and Mitigation |
|
CVE-2024-5535, CVE-2023-3446 |
Pre-requisites:
For Linux:
# chmod 0777 unbundle_openssl_102_Libs_From_DPA
Note: Post execution the script will automatically remove libssl.so.1.0.0, libcrypto.so.1.0.0, dpaagent_modhparray, and dpaagent_modhpvls and exit.
For Windows:
Note: Post execution of the script will automatically remove libeay32.dll, ssleay32.dll, dpaagent_modhparray.exe, dpaagent_modhpvls.exe and exit. |
Revision History
|
Revision |
Date |
Description |
|
1.0 |
2025-02-06 |
Initial Release |
|
2.0 |
2025-06-11 |
Minor updates related to workaround and formatting |
|
3.0 |
2025-06-18 |
Minor update related to workaround files availability |