DSA-2025-288: Security Update for Dell Data Protection Central Multiple Third-Party Component Vulnerabilities
Summary: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Impact
High
Additional Details
This Security Advisory applies to Data Protection Central versions 19.8.x, 19.9.x, 19.10.x, 19.11.x., 19.12.x
Details
|
Third-party Component |
CVEs Addressed |
More Information |
|---|---|---|
|
SUSE Linux Enterprise Server 12 SP5 |
CVE-2021-47222, CVE-2009-3560, CVE-2009-3720, CVE-2012-1147, CVE-2012-1148, CVE-2012-6702, CVE-2013-0340, CVE-2015-1283, CVE-2016-4472, CVE-2020-36789, CVE-2020-36791, CVE-2021-20320, CVE-2021-4159, CVE-2021-47170, CVE-2021-47648, CVE-2021-47659, CVE-2021-47668, CVE-2021-47669, CVE-2021-47670, CVE-2022-3564, CVE-2022-49044, CVE-2022-49053, CVE-2022-49055, CVE-2022-49060, CVE-2022-49084, CVE-2022-49086, CVE-2022-49111, CVE-2022-49118, CVE-2022-49121, CVE-2022-49137, CVE-2022-49139, CVE-2022-49145, CVE-2022-49168, CVE-2022-49171, CVE-2022-49175, CVE-2022-49176, CVE-2022-49179, CVE-2022-49188, CVE-2022-49190, CVE-2022-49197, CVE-2022-49205, CVE-2022-49212, CVE-2022-49216, CVE-2022-49220, CVE-2022-49232, CVE-2022-49235, CVE-2022-49248, CVE-2022-49253, CVE-2022-49290, CVE-2022-49305, CVE-2022-49320, CVE-2022-49325, CVE-2022-49326, CVE-2022-49331, CVE-2022-49335, CVE-2022-49344, CVE-2022-49351, CVE-2022-49371, CVE-2022-49372, CVE-2022-49382, CVE-2022-49385, CVE-2022-49390, CVE-2022-49396, CVE-2022-49397, CVE-2022-49411, CVE-2022-49420, CVE-2022-49441, CVE-2022-49442, CVE-2022-49445, CVE-2022-49460, CVE-2022-49465, CVE-2022-49467, CVE-2022-49474, CVE-2022-49478, CVE-2022-49489, CVE-2022-49491, CVE-2022-49503, CVE-2022-49504, CVE-2022-49521, CVE-2022-49525, CVE-2022-49534, CVE-2022-49535, CVE-2022-49536, CVE-2022-49537, CVE-2022-49542, CVE-2022-49546, CVE-2022-49561, CVE-2022-49590, CVE-2022-49592, CVE-2022-49610, CVE-2022-49619, CVE-2022-49620, CVE-2022-49625, CVE-2022-49635, CVE-2022-49640, CVE-2022-49641, CVE-2022-49652, CVE-2022-49658, CVE-2022-49668, CVE-2022-49693, CVE-2022-49715, CVE-2022-49725, CVE-2022-49728, CVE-2022-49729, CVE-2022-49730, CVE-2022-49740, CVE-2022-49749, CVE-2022-49751, CVE-2022-49753, CVE-2022-49761, CVE-2022-49769, CVE-2022-49771, CVE-2022-49772, CVE-2022-49775, CVE-2022-49776, CVE-2022-49787, CVE-2022-49788, CVE-2022-49789, CVE-2022-49813, CVE-2022-49821, CVE-2022-49822, CVE-2022-49826, CVE-2022-49829, CVE-2022-49832, CVE-2022-49835, CVE-2022-49840, CVE-2022-49842, CVE-2022-49846, CVE-2022-49853, CVE-2022-49861, CVE-2022-49862, CVE-2022-49865, CVE-2022-49871, CVE-2022-49872, CVE-2022-49874, CVE-2022-49880, CVE-2022-49889, CVE-2022-49892, CVE-2022-49898, CVE-2022-49906, CVE-2022-49907, CVE-2022-49913, CVE-2022-49914, CVE-2022-49915, CVE-2022-49922, CVE-2022-49923, CVE-2022-49924, CVE-2022-49925, CVE-2022-49927, CVE-2022-49931, CVE-2023-1074, CVE-2023-52426, CVE-2023-52868, CVE-2023-52933, CVE-2023-52935, CVE-2023-52975, CVE-2023-52988, CVE-2023-52989, CVE-2023-52993, CVE-2023-52997, CVE-2023-53006, CVE-2023-53008, CVE-2023-53010, CVE-2023-53015, CVE-2023-53019, CVE-2023-53023, CVE-2023-53024, CVE-2023-53032, CVE-2023-53039, CVE-2023-53041, CVE-2023-53044, CVE-2023-53045, CVE-2023-53051, CVE-2023-53056, CVE-2023-53060, CVE-2023-53062, CVE-2023-53066, CVE-2023-53068, CVE-2023-53075, CVE-2023-53078, CVE-2023-53079, CVE-2023-53080, CVE-2023-53094, CVE-2023-53100, CVE-2023-53101, CVE-2023-53103, CVE-2023-53108, CVE-2023-53114, CVE-2023-53121, CVE-2023-53124, CVE-2023-53125, CVE-2023-53131, CVE-2023-53139, CVE-2023-53140, CVE-2023-53141, CVE-2024-10041, CVE-2024-26740, CVE-2024-27010, CVE-2024-28757, CVE-2024-28956, CVE-2024-29018, CVE-2024-43420, CVE-2024-43790, CVE-2024-43802, CVE-2024-45021, CVE-2024-45306, CVE-2024-45332, CVE-2024-46751, CVE-2024-46752, CVE-2024-46763, CVE-2024-49994, CVE-2024-50038, CVE-2024-50106, CVE-2024-50272, CVE-2024-50602, CVE-2024-52559, CVE-2024-53124, CVE-2024-53140, CVE-2024-53168, CVE-2024-54683, CVE-2024-55549, CVE-2024-56590, CVE-2024-56640, CVE-2024-56770, CVE-2024-56779, CVE-2024-57924, CVE-2024-57980, CVE-2024-57981, CVE-2024-58005, CVE-2024-58009, CVE-2024-58017, CVE-2024-58063, CVE-2024-58071, CVE-2024-58093, CVE-2024-8176, CVE-2025-1215, CVE-2025-20012, CVE-2025-20054, CVE-2025-20103, CVE-2025-20623, CVE-2025-21587, CVE-2025-21635, CVE-2025-21648, CVE-2025-21702, CVE-2025-21703, CVE-2025-21704, CVE-2025-21735, CVE-2025-21750, CVE-2025-21758, CVE-2025-21764, CVE-2025-21768, CVE-2025-21772, CVE-2025-21779, CVE-2025-21785, CVE-2025-21787, CVE-2025-21806, CVE-2025-21814, CVE-2025-21858, CVE-2025-21862, CVE-2025-21877, CVE-2025-21881, CVE-2025-21891, CVE-2025-21909, CVE-2025-21910, CVE-2025-21916, CVE-2025-21922, CVE-2025-21926, CVE-2025-21927, CVE-2025-21931, CVE-2025-21934, CVE-2025-21935, CVE-2025-21941, CVE-2025-21948, CVE-2025-21956, CVE-2025-21957, CVE-2025-21963, CVE-2025-21964, CVE-2025-21969, CVE-2025-21976, CVE-2025-21993, CVE-2025-21996, CVE-2025-22004, CVE-2025-22007, CVE-2025-22008, CVE-2025-22010, CVE-2025-22018, CVE-2025-22021, CVE-2025-22025, CVE-2025-22027, CVE-2025-22029, CVE-2025-22050, CVE-2025-22053, CVE-2025-22055, CVE-2025-22058, CVE-2025-22060, CVE-2025-22063, CVE-2025-22086, CVE-2025-22104, CVE-2025-22134, CVE-2025-22868, CVE-2025-22869, CVE-2025-23131, CVE-2025-23136, CVE-2025-23150, CVE-2025-23161, CVE-2025-24014, CVE-2025-24495, CVE-2025-24855, CVE-2025-30691, CVE-2025-30698, CVE-2025-37749, CVE-2025-37752, CVE-2025-37780, CVE-2025-37782, CVE-2025-37785, CVE-2025-37789, CVE-2025-37794, CVE-2025-37796, CVE-2025-37797, CVE-2025-37798, CVE-2025-37823, CVE-2025-37833, CVE-2025-37852, CVE-2025-37879, CVE-2025-37948, CVE-2025-37949, CVE-2025-37963, CVE-2025-37989, CVE-2025-38637, CVE-2025-47273, CVE-2025-6018 |
Affected Products & Remediation
|
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|
|
Data Protection Central |
Data Protection Central OS Update dpc-osupdate-1.1.23-1.jar |
Versions 19.8. through 19.12.1 |
Version 19.12.1 or later |
|
|
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA)) |
DPC OS update with Version 1.1.23-1 |
Version prior to 2.7.8 |
Version 2.7.8 or later |
|
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|
|
Data Protection Central |
Data Protection Central OS Update dpc-osupdate-1.1.23-1.jar |
Versions 19.8. through 19.12.1 |
Version 19.12.1 or later |
|
|
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA)) |
DPC OS update with Version 1.1.23-1 |
Version prior to 2.7.8 |
Version 2.7.8 or later |
- Platform: SUSE Linux Enterprise Server 12 SP5
- The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.23-1
- To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see Data Protection Central: How to Install the Data Protection Central operating system update for upgrade instructions.
- See the latest ‘Data Protection Central OS Update’ file in Data Protection Central | Drivers & Downloads
- See the latest ‘Data Protection Central OS Updates Release Notes’ in Dell Data Protection Central OS Update Release Notes
- To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer to DPC: Fixing DPC IAM Service Failure Due to Docker Port Configuration Issue | Dell US before applying the update.
Revision History
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2025-07-16 | Initial Release |
| 2.0 | 2025-07-22 |
Updated for enhanced presentation with no changes to content |
| 3.0 | 2025-07-29 |
Updated for enhanced presentation with no changes to content |