DSA-2025-387: Security Update for Dell CloudBoost Virtual Appliance Multiple Vulnerabilities
Résumé: Dell CloudBoost Virtual Appliance remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Cet article concerne
Cet article ne concerne pas
Cet article n’est associé à aucun produit spécifique.
Toutes les versions du produit ne sont pas identifiées dans cet article.
Impact
Critical
Détails
| Third-party Component | CVEs | More Information |
| Bind | CVE-2024-11187, CVE-2024-12705 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2024-0853 | https://nvd.nist.gov/vuln/search |
| Django | CVE-2025-32873, CVE-2025-48432 | https://nvd.nist.gov/vuln/search |
| GNU elfutils | CVE-2025-1377, CVE-2024-25260, CVE-2025-1371, CVE-2025-1365, CVE-2025-1372 | https://nvd.nist.gov/vuln/search |
| Expat | CVE-2024-8176 | https://nvd.nist.gov/vuln/search |
| FreeType | CVE-2025-27363 | https://nvd.nist.gov/vuln/search |
| GLib | CVE-2025-4373 | https://nvd.nist.gov/vuln/search |
| GNU C Library | CVE-2025-4802 | https://nvd.nist.gov/vuln/search |
| GnuPG | CVE-2025-30258 | https://nvd.nist.gov/vuln/search |
| HAProxy | CVE-2025-32464 | https://nvd.nist.gov/vuln/search |
| Intel Microcode | CVE-2024-45332, CVE-2025-24495, CVE-2025-20623, CVE-2025-20103, CVE-2025-20054, CVE-2024-43420, CVE-2024-28956, CVE-2025-20012 | https://nvd.nist.gov/vuln/search |
| Oracle Java SE | CVE-2025-30691, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2024-54534, CVE-2025-23083, CVE-2025-24162, CVE-2025-24158, CVE-2025-24150, CVE-2025-24143, CVE-2025-23085, CVE-2025-23084, CVE-2024-54543, CVE-2024-54508, CVE-2024-54505, CVE-2024-54502, CVE-2024-54479, CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775, CVE-2024-47597, CVE-2024-47596, CVE-2024-47546, CVE-2024-47545, CVE-2024-47544, CVE-2024-44309, CVE-2024-44308, CVE-2024-44296, CVE-2024-44244, CVE-2024-44187, CVE-2024-44185, CVE-2024-40866, CVE-2024-27856 | https://nvd.nist.gov/vuln/search |
| Kerberos | CVE-2025-3576 | https://nvd.nist.gov/vuln/search |
| libxml2 | CVE-2025-32415, CVE-2025-32414 | https://nvd.nist.gov/vuln/search |
| Libxslt | CVE-2024-55549, CVE-2025-24855 | https://nvd.nist.gov/vuln/search |
| Linux kernel | CVE-2023-52664, CVE-2023-52927, CVE-2024-57977, CVE-2025-21760, CVE-2024-57979, CVE-2025-21731, CVE-2024-58052,CVE-2025-21744, CVE-2025-21887, CVE-2024-58072, CVE-2025-21802, CVE-2025-21943,CVE-2025-21722, CVE-2025-21814, CVE-2025-21811, CVE-2025-21878, CVE-2025-21917,CVE-2025-21715, CVE-2025-21711, CVE-2025-21804, CVE-2024-58002, CVE-2025-21785,CVE-2025-21795, CVE-2024-58055, CVE-2024-58071, CVE-2025-21728, CVE-2025-21749,CVE-2025-21858, CVE-2025-21721, CVE-2025-21727, CVE-2024-58020, CVE-2025-21866,CVE-2025-21912, CVE-2025-21781, CVE-2024-58007, CVE-2025-21806, CVE-2025-21950,CVE-2025-21844, CVE-2025-21924, CVE-2024-57986, CVE-2024-57980, CVE-2025-21772,CVE-2025-21926, CVE-2025-21823, CVE-2025-21726, CVE-2025-21753, CVE-2025-21708,CVE-2024-58014, CVE-2025-21779, CVE-2024-56599, CVE-2024-58063, CVE-2025-21830,CVE-2025-21748, CVE-2025-21909, CVE-2024-58058, CVE-2025-21826, CVE-2025-21910,CVE-2025-21776, CVE-2025-21871, CVE-2025-21791, CVE-2024-58076, CVE-2024-58085,CVE-2024-58090, CVE-2024-58010, CVE-2025-21848, CVE-2025-21835, CVE-2024-58017,CVE-2025-21761, CVE-2024-58051, CVE-2025-21898, CVE-2025-21971, CVE-2024-47726,CVE-2025-21718, CVE-2025-21684, CVE-2025-21735, CVE-2024-57978, CVE-2025-21758,CVE-2024-56721, CVE-2025-21764, CVE-2025-21951, CVE-2025-21820, CVE-2025-21922,CVE-2025-21736, CVE-2025-21862, CVE-2025-21719, CVE-2025-21846, CVE-2025-21934,CVE-2024-58001, CVE-2025-21904, CVE-2025-21865, CVE-2025-21787, CVE-2025-21763,CVE-2025-21919, CVE-2025-21647, CVE-2024-57981, CVE-2024-58016, CVE-2025-21766,CVE-2025-21914, CVE-2025-21916, CVE-2024-57973, CVE-2025-21765, CVE-2024-58083,CVE-2025-21925, CVE-2025-21796, CVE-2025-21920, CVE-2024-26982, CVE-2025-21782,CVE-2025-21704, CVE-2025-21767, CVE-2024-58069, CVE-2025-21877, CVE-2025-21799,CVE-2025-21935, CVE-2025-21905, CVE-2024-58005, CVE-2024-58086, CVE-2025-21928,CVE-2024-58079, CVE-2025-21762, CVE-2025-21745, CVE-2025-21875, CVE-2025-21707,CVE-2024-58034, CVE-2025-21948, CVE-2024-57834, CVE-2025-21859, CVE-2024-53168, CVE-2024-56551, CVE-2024-56608 | https://nvd.nist.gov/vuln/search |
| MySQL | CVE-2025-30722, CVE-2025-30682, CVE-2025-30703, CVE-2025-21580, CVE-2025-30681,CVE-2025-21574, CVE-2025-30696, CVE-2025-21584, CVE-2025-21581, CVE-2025-30687,CVE-2025-30704, CVE-2025-30683, CVE-2025-30685, CVE-2025-30693, CVE-2025-30684,CVE-2025-21579, CVE-2025-30695, CVE-2025-30688, CVE-2025-30699, CVE-2025-30721,CVE-2025-21577, CVE-2025-30715, CVE-2025-30689, CVE-2025-21585, CVE-2025-21588,CVE-2025-30705, CVE-2025-21575 | https://nvd.nist.gov/vuln/search |
| Net-tools | CVE-2025-46836 | https://nvd.nist.gov/vuln/search |
| Open VM Tools | CVE-2025-22247 | https://nvd.nist.gov/vuln/search |
| Perl | CVE-2024-56406 | https://nvd.nist.gov/vuln/search |
| pykerberos | CVE-2015-3206 | https://nvd.nist.gov/vuln/search |
| Ruby | CVE-2025-27219, CVE-2024-39908, CVE-2024-43398, CVE-2024-41123, CVE-2025-27220, CVE-2025-25186, CVE-2025-27221, CVE-2024-35176 | https://nvd.nist.gov/vuln/search |
| SQLite | CVE-2025-29088, CVE-2025-3277, CVE-2025-29087 | https://nvd.nist.gov/vuln/search |
| Systemd | CVE-2025-4598 | https://nvd.nist.gov/vuln/search |
| Vim | CVE-2025-26603, CVE-2025-1215 | https://nvd.nist.gov/vuln/search |
| Zlib | CVE-2023-45853, CVE-2022-37434, CVE-2016-9841, CVE-2016-9843, CVE-2016-9842, CVE-2018-25032 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
Produits concernés et mesure corrective
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
Notes:
- The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Versions prior to 19.13.0.2 means version 19.13.0.0 and 19.12.x, 19.11.x, 19.10.x, and 19.9.x family of main releases that are still under standard support. For more information refer to Dell End-of-Life Product List for Converged Infrastructure and Storage.
- Unless specified as impacted, the term “later releases” encompasses all Dell CloudBoost Virtual Appliance releases, under standard support, that are of a higher minor or major version than the specified release. Dell recommends that you always upgrade to the latest release/version for your product.
Solutions de contournement et mesures d’atténuation
None
Historique des révisions
| Revision | Date | Description |
| 1.0 | 2025-12-01 | Initial Release |
Informations connexes
Mention légale
Produits concernés
CloudBoost, CloudBoost Virtual AppliancePropriétés de l’article
Numéro d’article: 000397417
Type d’article: Dell Security Advisory
Dernière modification: 01 Dec 2025
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.