DSA-2025-387: Security Update for Dell CloudBoost Virtual Appliance Multiple Vulnerabilities
Yhteenveto: Dell CloudBoost Virtual Appliance remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Tämä artikkeli koskee tuotetta
Tämä artikkeli ei koske tuotetta
Tämä artikkeli ei liity tiettyyn tuotteeseen.
Tässä artikkelissa ei yksilöidä kaikkia tuoteversioita.
Vaikutus
Critical
Tiedot
| Third-party Component | CVEs | More Information |
| Bind | CVE-2024-11187, CVE-2024-12705 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2024-0853 | https://nvd.nist.gov/vuln/search |
| Django | CVE-2025-32873, CVE-2025-48432 | https://nvd.nist.gov/vuln/search |
| GNU elfutils | CVE-2025-1377, CVE-2024-25260, CVE-2025-1371, CVE-2025-1365, CVE-2025-1372 | https://nvd.nist.gov/vuln/search |
| Expat | CVE-2024-8176 | https://nvd.nist.gov/vuln/search |
| FreeType | CVE-2025-27363 | https://nvd.nist.gov/vuln/search |
| GLib | CVE-2025-4373 | https://nvd.nist.gov/vuln/search |
| GNU C Library | CVE-2025-4802 | https://nvd.nist.gov/vuln/search |
| GnuPG | CVE-2025-30258 | https://nvd.nist.gov/vuln/search |
| HAProxy | CVE-2025-32464 | https://nvd.nist.gov/vuln/search |
| Intel Microcode | CVE-2024-45332, CVE-2025-24495, CVE-2025-20623, CVE-2025-20103, CVE-2025-20054, CVE-2024-43420, CVE-2024-28956, CVE-2025-20012 | https://nvd.nist.gov/vuln/search |
| Oracle Java SE | CVE-2025-30691, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2024-54534, CVE-2025-23083, CVE-2025-24162, CVE-2025-24158, CVE-2025-24150, CVE-2025-24143, CVE-2025-23085, CVE-2025-23084, CVE-2024-54543, CVE-2024-54508, CVE-2024-54505, CVE-2024-54502, CVE-2024-54479, CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775, CVE-2024-47597, CVE-2024-47596, CVE-2024-47546, CVE-2024-47545, CVE-2024-47544, CVE-2024-44309, CVE-2024-44308, CVE-2024-44296, CVE-2024-44244, CVE-2024-44187, CVE-2024-44185, CVE-2024-40866, CVE-2024-27856 | https://nvd.nist.gov/vuln/search |
| Kerberos | CVE-2025-3576 | https://nvd.nist.gov/vuln/search |
| libxml2 | CVE-2025-32415, CVE-2025-32414 | https://nvd.nist.gov/vuln/search |
| Libxslt | CVE-2024-55549, CVE-2025-24855 | https://nvd.nist.gov/vuln/search |
| Linux kernel | CVE-2023-52664, CVE-2023-52927, CVE-2024-57977, CVE-2025-21760, CVE-2024-57979, CVE-2025-21731, CVE-2024-58052,CVE-2025-21744, CVE-2025-21887, CVE-2024-58072, CVE-2025-21802, CVE-2025-21943,CVE-2025-21722, CVE-2025-21814, CVE-2025-21811, CVE-2025-21878, CVE-2025-21917,CVE-2025-21715, CVE-2025-21711, CVE-2025-21804, CVE-2024-58002, CVE-2025-21785,CVE-2025-21795, CVE-2024-58055, CVE-2024-58071, CVE-2025-21728, CVE-2025-21749,CVE-2025-21858, CVE-2025-21721, CVE-2025-21727, CVE-2024-58020, CVE-2025-21866,CVE-2025-21912, CVE-2025-21781, CVE-2024-58007, CVE-2025-21806, CVE-2025-21950,CVE-2025-21844, CVE-2025-21924, CVE-2024-57986, CVE-2024-57980, CVE-2025-21772,CVE-2025-21926, CVE-2025-21823, CVE-2025-21726, CVE-2025-21753, CVE-2025-21708,CVE-2024-58014, CVE-2025-21779, CVE-2024-56599, CVE-2024-58063, CVE-2025-21830,CVE-2025-21748, CVE-2025-21909, CVE-2024-58058, CVE-2025-21826, CVE-2025-21910,CVE-2025-21776, CVE-2025-21871, CVE-2025-21791, CVE-2024-58076, CVE-2024-58085,CVE-2024-58090, CVE-2024-58010, CVE-2025-21848, CVE-2025-21835, CVE-2024-58017,CVE-2025-21761, CVE-2024-58051, CVE-2025-21898, CVE-2025-21971, CVE-2024-47726,CVE-2025-21718, CVE-2025-21684, CVE-2025-21735, CVE-2024-57978, CVE-2025-21758,CVE-2024-56721, CVE-2025-21764, CVE-2025-21951, CVE-2025-21820, CVE-2025-21922,CVE-2025-21736, CVE-2025-21862, CVE-2025-21719, CVE-2025-21846, CVE-2025-21934,CVE-2024-58001, CVE-2025-21904, CVE-2025-21865, CVE-2025-21787, CVE-2025-21763,CVE-2025-21919, CVE-2025-21647, CVE-2024-57981, CVE-2024-58016, CVE-2025-21766,CVE-2025-21914, CVE-2025-21916, CVE-2024-57973, CVE-2025-21765, CVE-2024-58083,CVE-2025-21925, CVE-2025-21796, CVE-2025-21920, CVE-2024-26982, CVE-2025-21782,CVE-2025-21704, CVE-2025-21767, CVE-2024-58069, CVE-2025-21877, CVE-2025-21799,CVE-2025-21935, CVE-2025-21905, CVE-2024-58005, CVE-2024-58086, CVE-2025-21928,CVE-2024-58079, CVE-2025-21762, CVE-2025-21745, CVE-2025-21875, CVE-2025-21707,CVE-2024-58034, CVE-2025-21948, CVE-2024-57834, CVE-2025-21859, CVE-2024-53168, CVE-2024-56551, CVE-2024-56608 | https://nvd.nist.gov/vuln/search |
| MySQL | CVE-2025-30722, CVE-2025-30682, CVE-2025-30703, CVE-2025-21580, CVE-2025-30681,CVE-2025-21574, CVE-2025-30696, CVE-2025-21584, CVE-2025-21581, CVE-2025-30687,CVE-2025-30704, CVE-2025-30683, CVE-2025-30685, CVE-2025-30693, CVE-2025-30684,CVE-2025-21579, CVE-2025-30695, CVE-2025-30688, CVE-2025-30699, CVE-2025-30721,CVE-2025-21577, CVE-2025-30715, CVE-2025-30689, CVE-2025-21585, CVE-2025-21588,CVE-2025-30705, CVE-2025-21575 | https://nvd.nist.gov/vuln/search |
| Net-tools | CVE-2025-46836 | https://nvd.nist.gov/vuln/search |
| Open VM Tools | CVE-2025-22247 | https://nvd.nist.gov/vuln/search |
| Perl | CVE-2024-56406 | https://nvd.nist.gov/vuln/search |
| pykerberos | CVE-2015-3206 | https://nvd.nist.gov/vuln/search |
| Ruby | CVE-2025-27219, CVE-2024-39908, CVE-2024-43398, CVE-2024-41123, CVE-2025-27220, CVE-2025-25186, CVE-2025-27221, CVE-2024-35176 | https://nvd.nist.gov/vuln/search |
| SQLite | CVE-2025-29088, CVE-2025-3277, CVE-2025-29087 | https://nvd.nist.gov/vuln/search |
| Systemd | CVE-2025-4598 | https://nvd.nist.gov/vuln/search |
| Vim | CVE-2025-26603, CVE-2025-1215 | https://nvd.nist.gov/vuln/search |
| Zlib | CVE-2023-45853, CVE-2022-37434, CVE-2016-9841, CVE-2016-9843, CVE-2016-9842, CVE-2018-25032 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
Tuotteet, joihin asia vaikuttaa, ja tilanteen korjaaminen
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
Notes:
- The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Versions prior to 19.13.0.2 means version 19.13.0.0 and 19.12.x, 19.11.x, 19.10.x, and 19.9.x family of main releases that are still under standard support. For more information refer to Dell End-of-Life Product List for Converged Infrastructure and Storage.
- Unless specified as impacted, the term “later releases” encompasses all Dell CloudBoost Virtual Appliance releases, under standard support, that are of a higher minor or major version than the specified release. Dell recommends that you always upgrade to the latest release/version for your product.
Kiertotavat ja lievennyskeinot
None
Versiohistoria
| Revision | Date | Description |
| 1.0 | 2025-12-01 | Initial Release |
Asiaan liittyvät tiedot
Vastuuvapauslauseke
Tuotteet, joihin vaikutus kohdistuu
CloudBoost, CloudBoost Virtual ApplianceArtikkelin ominaisuudet
Artikkelin numero: 000397417
Artikkelin tyyppi: Dell Security Advisory
Viimeksi muutettu: 01 jouluk. 2025
Etsi vastauksia kysymyksiisi muilta Dell-käyttäjiltä
Tukipalvelut
Tarkista, kuuluuko laitteesi tukipalveluiden piiriin.