DSA-2025-387: Security Update for Dell CloudBoost Virtual Appliance Multiple Vulnerabilities
概要: Dell CloudBoost Virtual Appliance remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
この記事は次に適用されます:
この記事は次には適用されません:
この記事は、特定の製品に関連付けられていません。
すべての製品パージョンがこの記事に記載されているわけではありません。
影響
Critical
詳細
| Third-party Component | CVEs | More Information |
| Bind | CVE-2024-11187, CVE-2024-12705 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2024-0853 | https://nvd.nist.gov/vuln/search |
| Django | CVE-2025-32873, CVE-2025-48432 | https://nvd.nist.gov/vuln/search |
| GNU elfutils | CVE-2025-1377, CVE-2024-25260, CVE-2025-1371, CVE-2025-1365, CVE-2025-1372 | https://nvd.nist.gov/vuln/search |
| Expat | CVE-2024-8176 | https://nvd.nist.gov/vuln/search |
| FreeType | CVE-2025-27363 | https://nvd.nist.gov/vuln/search |
| GLib | CVE-2025-4373 | https://nvd.nist.gov/vuln/search |
| GNU C Library | CVE-2025-4802 | https://nvd.nist.gov/vuln/search |
| GnuPG | CVE-2025-30258 | https://nvd.nist.gov/vuln/search |
| HAProxy | CVE-2025-32464 | https://nvd.nist.gov/vuln/search |
| Intel Microcode | CVE-2024-45332, CVE-2025-24495, CVE-2025-20623, CVE-2025-20103, CVE-2025-20054, CVE-2024-43420, CVE-2024-28956, CVE-2025-20012 | https://nvd.nist.gov/vuln/search |
| Oracle Java SE | CVE-2025-30691, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2024-54534, CVE-2025-23083, CVE-2025-24162, CVE-2025-24158, CVE-2025-24150, CVE-2025-24143, CVE-2025-23085, CVE-2025-23084, CVE-2024-54543, CVE-2024-54508, CVE-2024-54505, CVE-2024-54502, CVE-2024-54479, CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775, CVE-2024-47597, CVE-2024-47596, CVE-2024-47546, CVE-2024-47545, CVE-2024-47544, CVE-2024-44309, CVE-2024-44308, CVE-2024-44296, CVE-2024-44244, CVE-2024-44187, CVE-2024-44185, CVE-2024-40866, CVE-2024-27856 | https://nvd.nist.gov/vuln/search |
| Kerberos | CVE-2025-3576 | https://nvd.nist.gov/vuln/search |
| libxml2 | CVE-2025-32415, CVE-2025-32414 | https://nvd.nist.gov/vuln/search |
| Libxslt | CVE-2024-55549, CVE-2025-24855 | https://nvd.nist.gov/vuln/search |
| Linux kernel | CVE-2023-52664, CVE-2023-52927, CVE-2024-57977, CVE-2025-21760, CVE-2024-57979, CVE-2025-21731, CVE-2024-58052,CVE-2025-21744, CVE-2025-21887, CVE-2024-58072, CVE-2025-21802, CVE-2025-21943,CVE-2025-21722, CVE-2025-21814, CVE-2025-21811, CVE-2025-21878, CVE-2025-21917,CVE-2025-21715, CVE-2025-21711, CVE-2025-21804, CVE-2024-58002, CVE-2025-21785,CVE-2025-21795, CVE-2024-58055, CVE-2024-58071, CVE-2025-21728, CVE-2025-21749,CVE-2025-21858, CVE-2025-21721, CVE-2025-21727, CVE-2024-58020, CVE-2025-21866,CVE-2025-21912, CVE-2025-21781, CVE-2024-58007, CVE-2025-21806, CVE-2025-21950,CVE-2025-21844, CVE-2025-21924, CVE-2024-57986, CVE-2024-57980, CVE-2025-21772,CVE-2025-21926, CVE-2025-21823, CVE-2025-21726, CVE-2025-21753, CVE-2025-21708,CVE-2024-58014, CVE-2025-21779, CVE-2024-56599, CVE-2024-58063, CVE-2025-21830,CVE-2025-21748, CVE-2025-21909, CVE-2024-58058, CVE-2025-21826, CVE-2025-21910,CVE-2025-21776, CVE-2025-21871, CVE-2025-21791, CVE-2024-58076, CVE-2024-58085,CVE-2024-58090, CVE-2024-58010, CVE-2025-21848, CVE-2025-21835, CVE-2024-58017,CVE-2025-21761, CVE-2024-58051, CVE-2025-21898, CVE-2025-21971, CVE-2024-47726,CVE-2025-21718, CVE-2025-21684, CVE-2025-21735, CVE-2024-57978, CVE-2025-21758,CVE-2024-56721, CVE-2025-21764, CVE-2025-21951, CVE-2025-21820, CVE-2025-21922,CVE-2025-21736, CVE-2025-21862, CVE-2025-21719, CVE-2025-21846, CVE-2025-21934,CVE-2024-58001, CVE-2025-21904, CVE-2025-21865, CVE-2025-21787, CVE-2025-21763,CVE-2025-21919, CVE-2025-21647, CVE-2024-57981, CVE-2024-58016, CVE-2025-21766,CVE-2025-21914, CVE-2025-21916, CVE-2024-57973, CVE-2025-21765, CVE-2024-58083,CVE-2025-21925, CVE-2025-21796, CVE-2025-21920, CVE-2024-26982, CVE-2025-21782,CVE-2025-21704, CVE-2025-21767, CVE-2024-58069, CVE-2025-21877, CVE-2025-21799,CVE-2025-21935, CVE-2025-21905, CVE-2024-58005, CVE-2024-58086, CVE-2025-21928,CVE-2024-58079, CVE-2025-21762, CVE-2025-21745, CVE-2025-21875, CVE-2025-21707,CVE-2024-58034, CVE-2025-21948, CVE-2024-57834, CVE-2025-21859, CVE-2024-53168, CVE-2024-56551, CVE-2024-56608 | https://nvd.nist.gov/vuln/search |
| MySQL | CVE-2025-30722, CVE-2025-30682, CVE-2025-30703, CVE-2025-21580, CVE-2025-30681,CVE-2025-21574, CVE-2025-30696, CVE-2025-21584, CVE-2025-21581, CVE-2025-30687,CVE-2025-30704, CVE-2025-30683, CVE-2025-30685, CVE-2025-30693, CVE-2025-30684,CVE-2025-21579, CVE-2025-30695, CVE-2025-30688, CVE-2025-30699, CVE-2025-30721,CVE-2025-21577, CVE-2025-30715, CVE-2025-30689, CVE-2025-21585, CVE-2025-21588,CVE-2025-30705, CVE-2025-21575 | https://nvd.nist.gov/vuln/search |
| Net-tools | CVE-2025-46836 | https://nvd.nist.gov/vuln/search |
| Open VM Tools | CVE-2025-22247 | https://nvd.nist.gov/vuln/search |
| Perl | CVE-2024-56406 | https://nvd.nist.gov/vuln/search |
| pykerberos | CVE-2015-3206 | https://nvd.nist.gov/vuln/search |
| Ruby | CVE-2025-27219, CVE-2024-39908, CVE-2024-43398, CVE-2024-41123, CVE-2025-27220, CVE-2025-25186, CVE-2025-27221, CVE-2024-35176 | https://nvd.nist.gov/vuln/search |
| SQLite | CVE-2025-29088, CVE-2025-3277, CVE-2025-29087 | https://nvd.nist.gov/vuln/search |
| Systemd | CVE-2025-4598 | https://nvd.nist.gov/vuln/search |
| Vim | CVE-2025-26603, CVE-2025-1215 | https://nvd.nist.gov/vuln/search |
| Zlib | CVE-2023-45853, CVE-2022-37434, CVE-2016-9841, CVE-2016-9843, CVE-2016-9842, CVE-2018-25032 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
影響を受ける製品と修復
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
Notes:
- The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Versions prior to 19.13.0.2 means version 19.13.0.0 and 19.12.x, 19.11.x, 19.10.x, and 19.9.x family of main releases that are still under standard support. For more information refer to Dell End-of-Life Product List for Converged Infrastructure and Storage.
- Unless specified as impacted, the term “later releases” encompasses all Dell CloudBoost Virtual Appliance releases, under standard support, that are of a higher minor or major version than the specified release. Dell recommends that you always upgrade to the latest release/version for your product.
回避策と緩和策
None
変更履歴
| Revision | Date | Description |
| 1.0 | 2025-12-01 | Initial Release |
関連情報
法的免責事項
対象製品
CloudBoost, CloudBoost Virtual Appliance文書のプロパティ
文書番号: 000397417
文書の種類: Dell Security Advisory
最終更新: 01 12月 2025
質問に対する他のDellユーザーからの回答を見つける
サポート サービス
お使いのデバイスがサポート サービスの対象かどうかを確認してください。