DSA-2025-288: Security Update for Dell Data Protection Central Multiple Third-Party Component Vulnerabilities

Summary: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

High

Additional Details

This Security Advisory applies to Data Protection Central versions 19.8.x, 19.9.x, 19.10.x, 19.11.x., 19.12.x

Details

Third-party Component

CVEs Addressed

More Information

SUSE Linux Enterprise Server 12 SP5

CVE-2021-47222, CVE-2009-3560, CVE-2009-3720, CVE-2012-1147, CVE-2012-1148, CVE-2012-6702, CVE-2013-0340, CVE-2015-1283, CVE-2016-4472, CVE-2020-36789, CVE-2020-36791, CVE-2021-20320, CVE-2021-4159, CVE-2021-47170, CVE-2021-47648, CVE-2021-47659, CVE-2021-47668, CVE-2021-47669, CVE-2021-47670, CVE-2022-3564, CVE-2022-49044, CVE-2022-49053, CVE-2022-49055, CVE-2022-49060, CVE-2022-49084, CVE-2022-49086, CVE-2022-49111, CVE-2022-49118, CVE-2022-49121, CVE-2022-49137, CVE-2022-49139, CVE-2022-49145, CVE-2022-49168, CVE-2022-49171, CVE-2022-49175, CVE-2022-49176, CVE-2022-49179, CVE-2022-49188, CVE-2022-49190, CVE-2022-49197, CVE-2022-49205, CVE-2022-49212, CVE-2022-49216, CVE-2022-49220, CVE-2022-49232, CVE-2022-49235, CVE-2022-49248, CVE-2022-49253, CVE-2022-49290, CVE-2022-49305, CVE-2022-49320, CVE-2022-49325, CVE-2022-49326, CVE-2022-49331, CVE-2022-49335, CVE-2022-49344, CVE-2022-49351, CVE-2022-49371, CVE-2022-49372, CVE-2022-49382, CVE-2022-49385, CVE-2022-49390, CVE-2022-49396, CVE-2022-49397, CVE-2022-49411, CVE-2022-49420, CVE-2022-49441, CVE-2022-49442, CVE-2022-49445, CVE-2022-49460, CVE-2022-49465, CVE-2022-49467, CVE-2022-49474, CVE-2022-49478, CVE-2022-49489, CVE-2022-49491, CVE-2022-49503, CVE-2022-49504, CVE-2022-49521, CVE-2022-49525, CVE-2022-49534, CVE-2022-49535, CVE-2022-49536, CVE-2022-49537, CVE-2022-49542, CVE-2022-49546, CVE-2022-49561, CVE-2022-49590, CVE-2022-49592, CVE-2022-49610, CVE-2022-49619, CVE-2022-49620, CVE-2022-49625, CVE-2022-49635, CVE-2022-49640, CVE-2022-49641, CVE-2022-49652, CVE-2022-49658, CVE-2022-49668, CVE-2022-49693, CVE-2022-49715, CVE-2022-49725, CVE-2022-49728, CVE-2022-49729, CVE-2022-49730, CVE-2022-49740, CVE-2022-49749, CVE-2022-49751, CVE-2022-49753, CVE-2022-49761, CVE-2022-49769, CVE-2022-49771, CVE-2022-49772, CVE-2022-49775, CVE-2022-49776, CVE-2022-49787, CVE-2022-49788, CVE-2022-49789, CVE-2022-49813, CVE-2022-49821, CVE-2022-49822, CVE-2022-49826, CVE-2022-49829, CVE-2022-49832, CVE-2022-49835, CVE-2022-49840, CVE-2022-49842, CVE-2022-49846, CVE-2022-49853, CVE-2022-49861, CVE-2022-49862, CVE-2022-49865, CVE-2022-49871, CVE-2022-49872, CVE-2022-49874, CVE-2022-49880, CVE-2022-49889, CVE-2022-49892, CVE-2022-49898, CVE-2022-49906, CVE-2022-49907, CVE-2022-49913, CVE-2022-49914, CVE-2022-49915, CVE-2022-49922, CVE-2022-49923, CVE-2022-49924, CVE-2022-49925, CVE-2022-49927, CVE-2022-49931, CVE-2023-1074, CVE-2023-52426, CVE-2023-52868, CVE-2023-52933, CVE-2023-52935, CVE-2023-52975, CVE-2023-52988, CVE-2023-52989, CVE-2023-52993, CVE-2023-52997, CVE-2023-53006, CVE-2023-53008, CVE-2023-53010, CVE-2023-53015, CVE-2023-53019, CVE-2023-53023, CVE-2023-53024, CVE-2023-53032, CVE-2023-53039, CVE-2023-53041, CVE-2023-53044, CVE-2023-53045, CVE-2023-53051, CVE-2023-53056, CVE-2023-53060, CVE-2023-53062, CVE-2023-53066, CVE-2023-53068, CVE-2023-53075, CVE-2023-53078, CVE-2023-53079, CVE-2023-53080, CVE-2023-53094, CVE-2023-53100, CVE-2023-53101, CVE-2023-53103, CVE-2023-53108, CVE-2023-53114, CVE-2023-53121, CVE-2023-53124, CVE-2023-53125, CVE-2023-53131, CVE-2023-53139, CVE-2023-53140, CVE-2023-53141, CVE-2024-10041, CVE-2024-26740, CVE-2024-27010, CVE-2024-28757, CVE-2024-28956, CVE-2024-29018, CVE-2024-43420, CVE-2024-43790, CVE-2024-43802, CVE-2024-45021, CVE-2024-45306, CVE-2024-45332, CVE-2024-46751, CVE-2024-46752, CVE-2024-46763, CVE-2024-49994, CVE-2024-50038, CVE-2024-50106, CVE-2024-50272, CVE-2024-50602, CVE-2024-52559, CVE-2024-53124, CVE-2024-53140, CVE-2024-53168, CVE-2024-54683, CVE-2024-55549, CVE-2024-56590, CVE-2024-56640, CVE-2024-56770, CVE-2024-56779, CVE-2024-57924, CVE-2024-57980, CVE-2024-57981, CVE-2024-58005, CVE-2024-58009, CVE-2024-58017, CVE-2024-58063, CVE-2024-58071, CVE-2024-58093, CVE-2024-8176, CVE-2025-1215, CVE-2025-20012, CVE-2025-20054, CVE-2025-20103, CVE-2025-20623, CVE-2025-21587, CVE-2025-21635, CVE-2025-21648, CVE-2025-21702, CVE-2025-21703, CVE-2025-21704, CVE-2025-21735, CVE-2025-21750, CVE-2025-21758, CVE-2025-21764, CVE-2025-21768, CVE-2025-21772, CVE-2025-21779, CVE-2025-21785, CVE-2025-21787, CVE-2025-21806, CVE-2025-21814, CVE-2025-21858, CVE-2025-21862, CVE-2025-21877, CVE-2025-21881, CVE-2025-21891, CVE-2025-21909, CVE-2025-21910, CVE-2025-21916, CVE-2025-21922, CVE-2025-21926, CVE-2025-21927, CVE-2025-21931, CVE-2025-21934, CVE-2025-21935, CVE-2025-21941, CVE-2025-21948, CVE-2025-21956, CVE-2025-21957, CVE-2025-21963, CVE-2025-21964, CVE-2025-21969, CVE-2025-21976, CVE-2025-21993, CVE-2025-21996, CVE-2025-22004, CVE-2025-22007, CVE-2025-22008, CVE-2025-22010, CVE-2025-22018, CVE-2025-22021, CVE-2025-22025, CVE-2025-22027, CVE-2025-22029, CVE-2025-22050, CVE-2025-22053, CVE-2025-22055, CVE-2025-22058, CVE-2025-22060, CVE-2025-22063, CVE-2025-22086, CVE-2025-22104, CVE-2025-22134, CVE-2025-22868, CVE-2025-22869, CVE-2025-23131, CVE-2025-23136, CVE-2025-23150, CVE-2025-23161, CVE-2025-24014, CVE-2025-24495, CVE-2025-24855, CVE-2025-30691, CVE-2025-30698, CVE-2025-37749, CVE-2025-37752, CVE-2025-37780, CVE-2025-37782, CVE-2025-37785, CVE-2025-37789, CVE-2025-37794, CVE-2025-37796, CVE-2025-37797, CVE-2025-37798, CVE-2025-37823, CVE-2025-37833, CVE-2025-37852, CVE-2025-37879, CVE-2025-37948, CVE-2025-37949, CVE-2025-37963, CVE-2025-37989, CVE-2025-38637, CVE-2025-47273, CVE-2025-6018

https://www.suse.com/security/cve/This hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product

Software/Firmware

Affected Versions

Remediated Versions

Link

Data Protection Central

Data Protection Central OS Update dpc-osupdate-1.1.23-1.jar

Versions 19.8. through 19.12.1

Version 19.12.1 or later

Apply Latest Data Protection Central OS Update

PowerProtect DP Series (Integrated Data Protection Appliance (IDPA))

DPC OS update with Version 1.1.23-1

Version prior to 2.7.8

Version 2.7.8 or later

Apply Latest Data Protection Central OS Update

Product

Software/Firmware

Affected Versions

Remediated Versions

Link

Data Protection Central

Data Protection Central OS Update dpc-osupdate-1.1.23-1.jar

Versions 19.8. through 19.12.1

Version 19.12.1 or later

Apply Latest Data Protection Central OS Update

PowerProtect DP Series (Integrated Data Protection Appliance (IDPA))

DPC OS update with Version 1.1.23-1

Version prior to 2.7.8

Version 2.7.8 or later

Apply Latest Data Protection Central OS Update

Note:

Revision History

RevisionDateDescription
1.02025-07-16Initial Release
2.02025-07-22

Updated for enhanced presentation with no changes to content

3.02025-07-29

Updated for enhanced presentation with no changes to content

Related Information

Affected Products

Data Protection Central, Data Protection Suite Series, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software

Products

PowerProtect Data Protection Appliance
Article Properties
Article Number: 000345824
Article Type: Dell Security Advisory
Last Modified: 29 Jul 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.