DSA-2025-075: Security Update for Dell Data Protection Advisor for Multiple Vulnerabilities
Summary: Dell Data Protection Advisor remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-party Component | CVEs | More Information |
| Apache Avro | CVE-2021-43045, CVE-2023-39410 | https://nvd.nist.gov/vuln/search |
| Apache commons collections | CVE-2015-7501 | https://nvd.nist.gov/vuln/search |
| Apache commons compress | CVE-2023-42503, CVE-2024-25710, CVE-2024-26308 | https://nvd.nist.gov/vuln/search |
| Apache Mina SSHD Common support utilities | CVE-2022-45047 | https://nvd.nist.gov/vuln/search |
| Apache Mina SSHD Core | CVE-2021-30129, CVE-2023-35887, CVE-2023-48795 | https://nvd.nist.gov/vuln/search |
| Apache Tomcat | CVE-2021-24122, CVE-2021-30640, CVE-2021-33037, CVE-2022-34305, CVE-2020-9484, CVE-2020-17527, CVE-2021-25122, CVE-2021-25329, CVE-2021-30639,CVE-2021-41079, CVE-2022-23181, CVE-2022-29885, CVE-2022-25762, CVE-2022-42252, CVE-2023-46589, CVE-2021-43980, CVE-2023-28708, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2024-21733 | https://nvd.nist.gov/vuln/search |
| Apache Velocity | CVE-2020-13936 | https://nvd.nist.gov/vuln/search |
| Apache Xerces | CVE-2022-23437 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2023-38545 | https://nvd.nist.gov/vuln/search |
| Dom4j | CVE-2020-10683 | https://nvd.nist.gov/vuln/search |
| Google-guava | CVE-2023-2976, CVE-2020-8908 | https://nvd.nist.gov/vuln/search |
| H2 Database Engine | CVE-2022-45868 | https://nvd.nist.gov/vuln/search |
| Java SE 8u421 | CVE-2024-21235, CVE-2024-21217, CVE-2024-21210, CVE-2024-21208 | https://nvd.nist.gov/vuln/search |
| Jboss REST Easy | CVE-2016-9606, CVE-2020-25633 | https://nvd.nist.gov/vuln/search |
| Jettison | CVE-2022-40149, CVE-2022-40150, CVE-2022-45685, CVE-2022-45693, CVE-2023-1436 | https://nvd.nist.gov/vuln/search |
| JGit | CVE-2023-4759 | https://nvd.nist.gov/vuln/search |
| Jsoup | CVE-2021-37714, CVE-2022-36033 | https://nvd.nist.gov/vuln/search |
| libcurl | CVE-2023-27537, CVE-2023-38039 | https://nvd.nist.gov/vuln/search |
| MySql Connector | CVE-2023-22102, CVE-2023-21971 | https://nvd.nist.gov/vuln/search |
| okHttp | CVE-2018-20200 | https://nvd.nist.gov/vuln/search |
| PostgreSQL driver | CVE-2024-1597 | https://nvd.nist.gov/vuln/search |
| Slf4j_ext | CVE-2018-8088 | https://nvd.nist.gov/vuln/search |
| SnakeYaml | CVE-2022-41854, CVE-2022-38750,CVE-2022-38751, CVE-2022-38749, CVE-2022-25857, CVE-2022-1471, CVE-2022-38752 | https://nvd.nist.gov/vuln/search |
| SSH | CVE-2023-46445, CVE-2023-46446 | https://nvd.nist.gov/vuln/search |
| Wildfly | CVE-2020-14338 | https://nvd.nist.gov/vuln/search |
| XML External Entity | CVE-2014-3530 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46699 | Dell Data Protection Advisor, versions prior to 19.12, contains an Improper Neutralization of Special Elements Used in a Template Engine vulnerability in the Server. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46699 | Dell Data Protection Advisor, versions prior to 19.12, contains an Improper Neutralization of Special Elements Used in a Template Engine vulnerability in the Server. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
Affected Products & Remediation
| Product | Affected Versions | Remediated Versions | Link to Update |
| Data Protection Advisor | Versions 19.9, 19.10 and 19.11 | Version 19.12 or later | Data Protection Advisor Downloads Area |
| Product | Affected Versions | Remediated Versions | Link to Update |
| Data Protection Advisor | Versions 19.9, 19.10 and 19.11 | Version 19.12 or later | Data Protection Advisor Downloads Area |
Notes:
- Dell recommends that you always upgrade to the latest release/version for your product.
- To request the workaround files that remove the affected OpenSSL-dependent libraries, or to receive assistance with applying the workaround, please contact Dell Customer Support.
Workarounds & Mitigations
| CVE ID | Workaround and Mitigation |
|
CVE-2024-5535, CVE-2023-3446 |
Pre-requisites:
For Linux:
# chmod 0777 unbundle_openssl_102_Libs_From_DPA
Note: Post execution the script will automatically remove libssl.so.1.0.0, libcrypto.so.1.0.0, dpaagent_modhparray, and dpaagent_modhpvls and exit.
For Windows:
Note: Post execution of the script will automatically remove libeay32.dll, ssleay32.dll, dpaagent_modhparray.exe, dpaagent_modhpvls.exe and exit. |
Revision History
| Revision | Date | Description |
| 1.0 | 2025-02-06 | Initial Release |
| 2.0 | 2025-06-11 | Minor updates related to workaround and formatting |
| 3.0 | 2025-06-18 | Minor update related to workaround files availability |
| 4.0 | 2026-01-21 | Major update to include CVE-2025-46699 |
Related Information
Legal Disclaimer
Affected Products
Data Protection Advisor, Data Protection Suite SeriesArticle Properties
Article Number: 000281732
Article Type: Dell Security Advisory
Last Modified: 21 Jan 2026
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.