DSA-2025-361: Security Update for Dell Data Protection Central Multiple Third Party Component Vulnerabilities
Summary: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Impact
Critical
Details
| Third-party Component | CVEs Addressed | More Information |
| SUSE Linux Enterprise Server 12 SP5 | CVE-2006-7250, CVE-2009-2625, CVE-2011-4108, CVE-2013-0169, CVE-2015-3193, CVE-2016-0701, CVE-2016-10009, CVE-2016-5420, CVE-2017-14245, CVE-2017-14246, CVE-2017-17405, CVE-2017-17484, CVE-2017-17742, CVE-2017-7867, CVE-2017-8816, CVE-2018-10360 , CVE-2018-19638, CVE-2019-12450, CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387, CVE-2019-15167, CVE-2019-19880, CVE-2019-19921, CVE-2019-9636, CVE-2019-9947, CVE-2020-16599, CVE-2020-5260, CVE-2021-46984, CVE-2021-46987, CVE-2021-47212, CVE-2021-47455, CVE-2021-47527, CVE-2022-1292, CVE-2022-1679, CVE-2022-21546, CVE-2022-2586, CVE-2022-3903, CVE-2022-39253, CVE-2022-4095, CVE-2022-4129, CVE-2022-4662, CVE-2022-49138, CVE-2022-49154, CVE-2022-49319, CVE-2022-49323, CVE-2022-49622, CVE-2022-49731, CVE-2022-49764, CVE-2022-49768, CVE-2022-49780, CVE-2022-49814, CVE-2022-49825, CVE-2022-49879, CVE-2022-49881, CVE-2022-49917, CVE-2022-49921, CVE-2022-49934, CVE-2022-49938, CVE-2022-49948, CVE-2022-49954, CVE-2022-49957, CVE-2022-49967, CVE-2022-49969, CVE-2022-49975, CVE-2022-49977, CVE-2022-49978, CVE-2022-49980, CVE-2022-49981, CVE-2022-49986, CVE-2022-49987, CVE-2022-49990, CVE-2022-49993, CVE-2022-50007, CVE-2022-50008, CVE-2022-50012, CVE-2022-50020, CVE-2022-50022, CVE-2022-50025, CVE-2022-50027, CVE-2022-50030, CVE-2022-50033, CVE-2022-50045, CVE-2022-50055, CVE-2022-50065, CVE-2022-50066, CVE-2022-50073, CVE-2022-50080, CVE-2022-50082, CVE-2022-50083, CVE-2022-50084, CVE-2022-50085, CVE-2022-50087, CVE-2022-50091, CVE-2022-50092, CVE-2022-50093, CVE-2022-50094, CVE-2022-50097, CVE-2022-50098, CVE-2022-50099, CVE-2022-50101, CVE-2022-50102, CVE-2022-50103, CVE-2022-50104, CVE-2022-50109, CVE-2022-50116, CVE-2022-50126, CVE-2022-50127, CVE-2022-50134, CVE-2022-50138, CVE-2022-50141, CVE-2022-50146, CVE-2022-50149, CVE-2022-50152, CVE-2022-50153, CVE-2022-50159, CVE-2022-50162, CVE-2022-50173, CVE-2022-50181, CVE-2022-50185, CVE-2022-50191, CVE-2022-50200, CVE-2022-50206, CVE-2022-50211, CVE-2022-50215, CVE-2022-50220, CVE-2022-50226, CVE-2022-50228, CVE-2022-50229, CVE-2023-2176, CVE-2023-3111, CVE-2023-3817, CVE-2023-52500, CVE-2023-52813, CVE-2023-52878, CVE-2023-52927, CVE-2023-53020, CVE-2023-53063, CVE-2023-53081, CVE-2023-53090, CVE-2023-53091, CVE-2023-53117, CVE-2023-53118, CVE-2023-53133, CVE-2024-11168, CVE-2024-12718, CVE-2024-2236, CVE-2024-26586, CVE-2024-26825, CVE-2024-26872, CVE-2024-26875, CVE-2024-26974, CVE-2024-26982, CVE-2024-35790, CVE-2024-35839, CVE-2024-36959, CVE-2024-38588, CVE-2024-41965, CVE-2024-44963, CVE-2024-46713, CVE-2024-49861, CVE-2024-57982, CVE-2024-9287, CVE-2025-0495, CVE-2025-0938, CVE-2025-10148, CVE-2025-20053, CVE-2025-20109, CVE-2025-21731, CVE-2025-21898, CVE-2025-21920, CVE-2025-21928, CVE-2025-21971, CVE-2025-22022, CVE-2025-22035, CVE-2025-22247, CVE-2025-22839, CVE-2025-22840, CVE-2025-22872, CVE-2025-22889, CVE-2025-23141, CVE-2025-23149, CVE-2025-23163, CVE-2025-26403, CVE-2025-27613, CVE-2025-29087, CVE-2025-29088, CVE-2025-29768, CVE-2025-30749, CVE-2025-30754, CVE-2025-30761, CVE-2025-32086, CVE-2025-32414, CVE-2025-32415, CVE-2025-32462, CVE-2025-37756, CVE-2025-37757, CVE-2025-37781, CVE-2025-37800, CVE-2025-37810, CVE-2025-37836, CVE-2025-37844, CVE-2025-37856, CVE-2025-37862, CVE-2025-37885, CVE-2025-37892, CVE-2025-37911, CVE-2025-37920, CVE-2025-37923, CVE-2025-37927, CVE-2025-37928, CVE-2025-37961, CVE-2025-37980, CVE-2025-37982, CVE-2025-37992, CVE-2025-37995, CVE-2025-37998, CVE-2025-38000, CVE-2025-38004, CVE-2025-38023, CVE-2025-38024, CVE-2025-38034, CVE-2025-38035, CVE-2025-38040, CVE-2025-38051, CVE-2025-38058, CVE-2025-38061, CVE-2025-38064, CVE-2025-38068, CVE-2025-38072, CVE-2025-38074, CVE-2025-38075, CVE-2025-38078, CVE-2025-38079, CVE-2025-38083, CVE-2025-38094, CVE-2025-38102, CVE-2025-38103, CVE-2025-38105, CVE-2025-38108, CVE-2025-38112, CVE-2025-38115, CVE-2025-38117, CVE-2025-38122, CVE-2025-38126, CVE-2025-38147, CVE-2025-38153, CVE-2025-38157, CVE-2025-38161, CVE-2025-38166, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180, CVE-2025-38181, CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38192, CVE-2025-38193, CVE-2025-38198, CVE-2025-38200, CVE-2025-38211, CVE-2025-38212, CVE-2025-38213, CVE-2025-38214, CVE-2025-38222, CVE-2025-38245, CVE-2025-38249, CVE-2025-38250, CVE-2025-38263, CVE-2025-38264, CVE-2025-38312, CVE-2025-38313, CVE-2025-38319, CVE-2025-38323, CVE-2025-38337, CVE-2025-38350, CVE-2025-38352, CVE-2025-38375, CVE-2025-38386, CVE-2025-38391, CVE-2025-38403, CVE-2025-38415, CVE-2025-38420, CVE-2025-38424, CVE-2025-38430, CVE-2025-38449, CVE-2025-38457, CVE-2025-38460, CVE-2025-38464, CVE-2025-38465, CVE-2025-38468, CVE-2025-38470, CVE-2025-38473, CVE-2025-38474, CVE-2025-38477, CVE-2025-38494, CVE-2025-38495, CVE-2025-38498, CVE-2025-38499, CVE-2025-38512, CVE-2025-38513, CVE-2025-38515, CVE-2025-38546, CVE-2025-38556, CVE-2025-38563, CVE-2025-38617, CVE-2025-38618, CVE-2025-38644, CVE-2025-4435, CVE-2025-4516, CVE-2025-4517, CVE-2025-46835, CVE-2025-48384, CVE-2025-4877, CVE-2025-4878, CVE-2025-49794, CVE-2025-49796, CVE-2025-50059, CVE-2025-50106, CVE-2025-5222, CVE-2025-5278, CVE-2025-5318, CVE-2025-5372, CVE-2025-54388, CVE-2025-6021, CVE-2025-6069, CVE-2025-6170, CVE-2025-6965, CVE-2025-7425, CVE-2025-9086 | suse.com |
Affected Products & Remediation
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.8 through 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.24-1 | Version 19.8 through 19.12(2) with Data Protection Central OS Update dpc-osupdate-1.1.24-1 | Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) | Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.9 and prior | Version 2.7.9 with Data Protection Central OS Update dpc-osupdate-1.1.24-1 | Apply Latest Data Protection Central OS Update |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.8 through 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.24-1 | Version 19.8 through 19.12(2) with Data Protection Central OS Update dpc-osupdate-1.1.24-1 | Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) | Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.9 and prior | Version 2.7.9 with Data Protection Central OS Update dpc-osupdate-1.1.24-1 | Apply Latest Data Protection Central OS Update |
- Platform: SUSE Linux Enterprise Server 12 SP5
- (2)Versions 19.8 through 19.12 covers DPC version 19.8.x, 19.9.x, 19.10.x, 19.11.x, 19.12.x.
- To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
- The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.24-1
To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.
See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers (Link will be updated once the release is done)
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs (Link will be updated once the release is done)
The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.24-1
NOTE: To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer to DPC: Fixing DPC IAM Service Failure Due to Docker Port Configuration Issue | Dell US before applying the update.
Revision History
| Revision | Date | Description |
| 1.0 | 2025-09-23 | Initial Release |
| 2.0 | 2025-09-23 | Minor formatting adjustments |