DSA-2025-195: Security Update for Dell Data Protection Central Multiple Third-Party Component Vulnerabilities
概要: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
影響
Critical
詳細情報
This Security Advisory applies to Data Protection Central versions 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x., 19.12.x and IDPA version 2.7.8.
詳細
|
Third-party Component |
CVEs Addressed |
More Information |
|---|---|---|
|
SUSE Linux Enterprise Server 12 SP5 |
CVE-2021-47222,CVE-2024-32465,CVE-2024-53141,CVE-2024-56642,CVE-2025-0690, CVE-2021-47223,CVE-2024-35847,CVE-2024-53146,CVE-2024-56643, CVE-2025-0725, CVE-2021-47634, CVE-2024-36293, CVE-2024-53150, CVE-2024-56647, CVE-2025-1118, CVE-2021-47644, CVE-2024-36484, CVE-2024-53155, CVE-2024-56650, CVE-2025-1125, CVE-2022-48742, CVE-2024-36883, CVE-2024-53156, CVE-2024-56658, CVE-2025-21502, CVE-2022-48953, CVE-2024-37020, CVE-2024-53157, CVE-2024-56661, CVE-2025-21638, CVE-2022-48975, CVE-2024-38589, CVE-2024-53172, CVE-2024-56662, CVE-2025-21639, CVE-2022-49006, CVE-2024-39355, CVE-2024-53173, CVE-2024-56664, CVE-2025-21640, CVE-2022-49033, CVE-2024-41013, CVE-2024-53179, CVE-2024-56681, CVE-2025-21653, CVE-2022-49035, CVE-2024-45774, CVE-2024-53185, CVE-2024-56688, CVE-2025-21664, CVE-2022-49043, CVE-2024-45775, CVE-2024-53197, CVE-2024-56700, CVE-2025-21673, CVE-2022-49076, CVE-2024-45776, CVE-2024-53198, CVE-2024-56704, CVE-2025-21678, CVE-2022-49080, CVE-2024-45777, CVE-2024-53210, CVE-2024-56722, CVE-2025-21682, CVE-2022-49089, CVE-2024-45778, CVE-2024-53214, CVE-2024-56724, CVE-2025-21689, CVE-2022-49124, CVE-2024-45779, CVE-2024-53217, CVE-2024-56737, CVE-2025-21690, CVE-2022-49134, CVE-2024-45780, CVE-2024-53224, CVE-2024-56739, CVE-2025-21700, CVE-2022-49135, CVE-2024-45781, CVE-2024-53227, CVE-2024-56747, CVE-2025-21753, CVE-2022-49151, CVE-2024-45782, CVE-2024-53239, CVE-2024-56748, CVE-2025-24928, CVE-2022-49178, CVE-2024-45783, CVE-2024-53240, CVE-2024-56756, CVE-2025-26465, CVE-2022-49182, CVE-2024-47141, CVE-2024-55916, CVE-2024-56759, CVE-2025-26597, CVE-2022-49201, CVE-2024-47666, CVE-2024-56171, CVE-2024-56763, CVE-2025-27113, CVE-2022-49247, CVE-2024-47678, CVE-2024-56369, CVE-2024-56769, CVE-2025-27363, CVE-2022-49490, CVE-2024-47809, CVE-2024-56531, CVE-2024-57791, CVE-2022-49626, CVE-2024-48881, CVE-2024-56532, CVE-2024-57849, CVE-2022-49661, CVE-2024-49944, CVE-2024-56533, CVE-2024-57884, CVE-2024-49948, CVE-2024-56539, CVE-2024-57887, CVE-2023-52434, CVE-2024-49963, CVE-2024-56548, CVE-2024-57888, CVE-2023-52572, CVE-2024-49975, CVE-2024-56551, CVE-2024-57890, CVE-2023-52853, CVE-2024-50036, CVE-2024-56569, CVE-2024-57892, CVE-2023-52922, CVE-2024-50039, CVE-2024-56570, CVE-2024-57893, CVE-2023-52924, CVE-2024-50067, CVE-2024-56574, CVE-2024-57896, CVE-2024-11053, CVE-2024-50142, CVE-2024-56587, CVE-2024-57899, CVE-2024-11187, CVE-2024-50143, CVE-2024-56593, CVE-2024-57903, CVE-2024-12085, CVE-2024-50151, CVE-2024-56594, CVE-2024-57922, CVE-2024-12086, CVE-2024-50166, CVE-2024-56599, CVE-2024-57929, CVE-2024-12087, CVE-2024-50199, CVE-2024-56600, CVE-2024-57931, CVE-2024-12088, CVE-2024-50211, CVE-2024-56601, CVE-2024-57932, CVE-2024-12133, CVE-2024-50251, CVE-2024-56603, CVE-2024-57938, CVE-2024-12747, CVE-2024-50256, CVE-2024-56604, CVE-2024-8805, CVE-2024-13176, CVE-2024-50262, CVE-2024-56605, CVE-2025-0167, CVE-2024-26644, CVE-2024-50287, CVE-2024-56606, CVE-2025-0395, CVE-2024-26810, CVE-2024-50299, CVE-2024-56615, CVE-2025-0622, CVE-2024-26976, CVE-2024-50304, CVE-2024-56616, CVE-2025-0624, CVE-2024-27397, CVE-2024-50349, CVE-2024-56623, CVE-2025-0677, CVE-2024-31068, CVE-2024-52006, CVE-2024-56630, CVE-2025-0678, CVE-2024-32002, CVE-2024-52332, CVE-2024-56631, CVE-2025-0684, CVE-2024-32004, CVE-2024-53057, CVE-2024-56633, CVE-2025-0685, CVE-2024-32020, CVE-2024-53101, CVE-2024-56637, CVE-2025-0686, CVE-2024-32021, CVE-2024-53112, CVE-2024-56641, CVE-2025-0689 |
影響を受ける製品と修復
|
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|
|
Dell Data Protection Central |
DPC OS update with OS update 1.1.22-1 |
Version 19.7.x through 19.12 |
Version 19.12.x or later |
|
|
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance |
IDPA 2.7.8 or later with DPC OS update Version 1.1.22-1 |
Versions prior to 2.7.8 |
Version 2.7.8 or later |
|
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|
|
Dell Data Protection Central |
DPC OS update with OS update 1.1.22-1 |
Version 19.7.x through 19.12 |
Version 19.12.x or later |
|
|
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance |
IDPA 2.7.8 or later with DPC OS update Version 1.1.22-1 |
Versions prior to 2.7.8 |
Version 2.7.8 or later |
- Platform: SUSE Linux Enterprise Server 12 SP5
- The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.22-1
- To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see Data Protection Central: How to Install the Data Protection Central operating system update for upgrade instructions.
- See the latest ‘Data Protection Central OS Update’ file in Data Protection Central | Drivers & Downloads
- See the latest ‘Data Protection Central OS Updates Release Notes’ in Dell Data Protection Central OS Update Release Notes
- To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer to DPC: Fixing DPC IAM Service Failure Due to Docker Port Configuration Issue | Dell US before applying the update.
変更履歴
|
Revision |
Date |
Description |
|---|---|---|
|
1.0 |
2025-07-22 |
Initial Release |