DSA-2025-450: Security Update for Dell NetWorker Virtual Edition OpenSSL Vulnerability

Summary: Dell Networker Virtual Edition remediation is available for an OpenSSL vulnerability that could be exploited by malicious users to compromise the affected system.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

Medium

Additional Details

This Security Advisory communicates vulnerabilities affecting versions prior to 19.13 which can be remediated by upgrading to version 19.13 or applying the mitigation steps outlined in the “Workarounds and Mitigation” section, if an immediate upgrade is not possible.

Details

Third-party Component CVEs More Information
OpenSSL CVE-2023-48795 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker Networker Virtual Edition Versions prior to 19.13 Version 19.13 or later NetWorker Downloads Area

 

Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker Networker Virtual Edition Versions prior to 19.13 Version 19.13 or later NetWorker Downloads Area

 

Notes:

  1. The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
  2. Versions prior to 19.13 means 19.12.x, 19.11.x, 19.10.x, and 19.9.x family of releases that are still under standard support. For more information refer to Dell End-of-Life Product List for Converged Infrastructure and Storage.
  3. Unless specified as impacted, the term “later releases” encompasses all NetWorker Virtual Edition releases, under standard support, that are of a higher minor or major version than the specified release. Dell recommends that you always upgrade to the latest release/version for your product.

Workarounds & Mitigations

CVE ID Workaround and Mitigation
CVE-2023-48795

To mitigate the vulnerability without upgrading, perform the following steps to disable ChaCha20-Poly1305:

 

  • Open /etc/ssh/sshd_config and add the following line to remove the cipher:
Ciphers -chacha20-poly1305@openssh.com
  • Restart the SSH daemon service by running the following command via CLI:
sudo systemctl restart ss (Alternatively: sudo service sshd restart)
  • Verify the cipher is disabled by executing:
ssh -Q cipher | grep ch

(The output should not include -chacha20-poly1305@openssh.com)

 

Revision History

RevisionDateDescription
1.02025-12-19Initial Release

 

Related Information

Affected Products

NetWorker Family, NetWorker
Article Properties
Article Number: 000405768
Article Type: Dell Security Advisory
Last Modified: 19 Dec 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.