DSA-2024-061: Dell PowerProtect Data Manager Update for Multiple Security Vulnerabilities
Resumen: Dell PowerProtect Data Manager remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Este artículo se aplica a
Este artículo no se aplica a
Este artículo no está vinculado a ningún producto específico.
No se identifican todas las versiones del producto en este artículo.
Impacto
Critical
Detalles
Third-Party Open-Source Components CVE Details:
| Third-party Components | CVEs | More Information |
|---|---|---|
| Spring Boot 2.7.17 | CVE-2023-34055 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Node.js 18.18.0 | CVE-2023-38552, CVE-2023-44487 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libcurl 7.87 | CVE-2023-38545 | https://nvd.nist.gov/vuln/detail/CVE-2023-38545 |
| jose4j 0.7.12 | CVE-2023-31582 | https://nvd.nist.gov/vuln/detail/CVE-2023-31582 |
| Logback1.2.12 | CVE-2023-6378 | https://nvd.nist.gov/vuln/detail/CVE-2023-6378 |
Operating System Components CVE Details:
| Third-party Component | CVEs | More Information |
|---|---|---|
| python3-cryptography=3.3.2-150400.23.1 | CVE-2023-49083 | https://www.suse.com/security/cve/CVE-2023-49083.html |
| libz1=1.2.11-150000.3.48.1 | CVE-2023-45853 | https://www.suse.com/security/cve/CVE-2023-45853.html |
| libpq5=16.1-150200.5.7.1 postgresql14-server=14.10-150200.5.36.1 postgresql14=14.10-150200.5.36.1 |
CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| libsqlite3-0=3.44.0-150000.3.23.1 sqlite3-tcl=3.44.0-150000.3.23.1 |
CVE-2023-2137 | https://www.suse.com/security/cve/CVE-2023-2137.html |
| libncurses6=6.1-150000.5.20.1 ncurses-utils=6.1-150000.5.20.1 terminfo-base=6.1-150000.5.20.1 terminfo-iterm=6.1-150000.5.20.1 terminfo-screen=6.1-150000.5.20.1 terminfo=6.1-150000.5.20.1 |
CVE-2023-50495 | https://www.suse.com/security/cve/CVE-2023-50495.html |
| docker=24.0.7_ce-150000.190.4 | CVE-2020-12912 | https://www.suse.com/security/cve/CVE-2020-12912.html |
| curl=8.0.1-150400.5.41.1 libcurl4=8.0.1-150400.5.41.1 |
CVE-2023-46218, CVE-2023-46219 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| libopenssl1_1-hmac=1.1.1l-150400.7.60.2 libopenssl1_1=1.1.1l-150400.7.60.2 openssl-1_1=1.1.1l-150400.7.60.2 |
CVE-2023-5678 | https://www.suse.com/security/cve/CVE-2023-5678.html |
| traceroute=2.0.21-150000.3.3.1 | CVE-2023-46316 | https://www.suse.com/security/cve/CVE-2023-46316.html |
| libruby2_5-2_5=2.5.9-150000.4.29.1 ruby2.5-stdlib=2.5.9-150000.4.29.1 ruby2.5=2.5.9-150000.4.29.1 |
CVE-2021-33621, CVE-2023-28755, CVE-2023-28756 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| libxml2-2=2.9.14-150400.5.25.1 libxml2-tools=2.9.14-150400.5.25.1 |
CVE-2023-45322 | https://www.suse.com/security/cve/CVE-2023-45322.html |
| tar-lang=1.34-150000.3.34.1 tar-rmt=1.34-150000.3.34.1 tar=1.34-150000.3.34.1 |
CVE-2023-39804 | https://www.suse.com/security/cve/CVE-2023-39804.html |
| kernel-default=5.14.21-150400.24.100.2 | CVE-2023-2006, CVE-2023-2163, CVE-2023-25775, CVE-2023-2860, CVE-2023-31085, CVE-2023-34324, CVE-2023-3777, CVE-2023-39189, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45862, CVE-2023-45863, CVE-2023-45871, CVE-2023-46813, CVE-2023-46862, CVE-2023-5158,CVE-2023-5178, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| libvmtools0=12.3.5-150300.46.1 open-vm-tools=12.3.5-150300.46.1 |
CVE-2023-34058, CVE-2023-34059 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| vim-data-common=9.0.2103-150000.5.57.1 vim-data=9.0.2103-150000.5.57.1 vim=9.0.2103-150000.5.57.1 |
CVE-2023-46246, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| python3-urllib3=1.25.10-150300.4.9.1 | CVE-2023-45803 | https://www.suse.com/security/cve/CVE-2023-45803.html |
| ucode-intel=20231114-150200.35.1 | CVE-2023-23583 | https://www.suse.com/security/cve/CVE-2023-23583.html |
| python3-setuptools=44.1.1-150400.9.6.1 | CVE-2022-40897 | https://www.suse.com/security/cve/CVE-2022-40897.html |
| libgnutls30-hmac=3.7.3-150400.4.38.1 libgnutls30=3.7.3-150400.4.38.1 |
CVE-2023-5981 | https://www.suse.com/security/cve/CVE-2023-5981.html |
| xen-libs=4.16.5_10-150400.4.43.1 | CVE-2023-46835, CVE-2023-46836 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| libnghttp2-14=1.40.0-150200.12.1 | CVE-2023-44487 | https://www.suse.com/security/cve/CVE-2023-44487.html |
| java-17-openjdk-headless=17.0.9.0-150400.3.33.1 | CVE-2023-22025, CVE-2023-22081 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| libzck1=1.1.16-150400.3.7.1 | CVE-2023-46228 | https://www.suse.com/security/cve/CVE-2023-46228.html |
| libavahi-client3=0.8-150400.7.13.1 libavahi-common3=0.8-150400.7.13.1 |
CVE-2023-38470, CVE-2023-38472, CVE-2023-38473 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| curl >= 8.0.1-150400.5.32.1 libcurl-devel >= 8.0.1-150400.5.32.1 libcurl4 >= 8.0.1-150400.5.32.1 libcurl4-32bit >= 8.0.1-150400.5.32.1 |
CVE-2023-38545, CVE-2023-38546 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2024-22454 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain a weak password recovery mechanism for forgotten passwords. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| CVE-2024-22445 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain an OS command injection vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2024-22454 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain a weak password recovery mechanism for forgotten passwords. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| CVE-2024-22445 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain an OS command injection vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Corrección y productos afectados
| Product | Affected Versions | Updated Versions | Link to Update | |
|---|---|---|---|---|
| Dell PowerProtect Data Manager | 19.15 and prior | 19.15. build 025 and later | PPDM 19.15 drivers and downloads | |
| Product | Affected Versions | Updated Versions | Link to Update | |
|---|---|---|---|---|
| Dell PowerProtect Data Manager | 19.15 and prior | 19.15. build 025 and later | PPDM 19.15 drivers and downloads | |
Historial de revisiones
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-02-13 | Initial Release |
Información relacionada
Descargo de responsabilidad
Productos afectados
PowerProtect Data ManagerPropiedades del artículo
Número del artículo: 000222025
Tipo de artículo: Dell Security Advisory
Última modificación: 28 ago 2025
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.