DSA-2025-075: Security Update for Dell Data Protection Advisor for Multiple Vulnerabilities
요약: Dell Data Protection Advisor remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system.
이 문서는 다음에 적용됩니다.
이 문서는 다음에 적용되지 않습니다.
이 문서는 특정 제품과 관련이 없습니다.
모든 제품 버전이 이 문서에 나와 있는 것은 아닙니다.
영향
Critical
세부 정보
| Third-party Component | CVEs | More Information |
| Apache Avro | CVE-2021-43045, CVE-2023-39410 | https://nvd.nist.gov/vuln/search |
| Apache commons collections | CVE-2015-7501 | https://nvd.nist.gov/vuln/search |
| Apache commons compress | CVE-2023-42503, CVE-2024-25710, CVE-2024-26308 | https://nvd.nist.gov/vuln/search |
| Apache Mina SSHD Common support utilities | CVE-2022-45047 | https://nvd.nist.gov/vuln/search |
| Apache Mina SSHD Core | CVE-2021-30129, CVE-2023-35887, CVE-2023-48795 | https://nvd.nist.gov/vuln/search |
| Apache Tomcat | CVE-2021-24122, CVE-2021-30640, CVE-2021-33037, CVE-2022-34305, CVE-2020-9484, CVE-2020-17527, CVE-2021-25122, CVE-2021-25329, CVE-2021-30639,CVE-2021-41079, CVE-2022-23181, CVE-2022-29885, CVE-2022-25762, CVE-2022-42252, CVE-2023-46589, CVE-2021-43980, CVE-2023-28708, CVE-2023-41080, CVE-2023-42795, CVE-2023-45648, CVE-2024-21733 | https://nvd.nist.gov/vuln/search |
| Apache Velocity | CVE-2020-13936 | https://nvd.nist.gov/vuln/search |
| Apache Xerces | CVE-2022-23437 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2023-38545 | https://nvd.nist.gov/vuln/search |
| Dom4j | CVE-2020-10683 | https://nvd.nist.gov/vuln/search |
| Google-guava | CVE-2023-2976, CVE-2020-8908 | https://nvd.nist.gov/vuln/search |
| H2 Database Engine | CVE-2022-45868 | https://nvd.nist.gov/vuln/search |
| Java SE 8u421 | CVE-2024-21235, CVE-2024-21217, CVE-2024-21210, CVE-2024-21208 | https://nvd.nist.gov/vuln/search |
| Jboss REST Easy | CVE-2016-9606, CVE-2020-25633 | https://nvd.nist.gov/vuln/search |
| Jettison | CVE-2022-40149, CVE-2022-40150, CVE-2022-45685, CVE-2022-45693, CVE-2023-1436 | https://nvd.nist.gov/vuln/search |
| JGit | CVE-2023-4759 | https://nvd.nist.gov/vuln/search |
| Jsoup | CVE-2021-37714, CVE-2022-36033 | https://nvd.nist.gov/vuln/search |
| libcurl | CVE-2023-27537, CVE-2023-38039 | https://nvd.nist.gov/vuln/search |
| MySql Connector | CVE-2023-22102, CVE-2023-21971 | https://nvd.nist.gov/vuln/search |
| okHttp | CVE-2018-20200 | https://nvd.nist.gov/vuln/search |
| PostgreSQL driver | CVE-2024-1597 | https://nvd.nist.gov/vuln/search |
| Slf4j_ext | CVE-2018-8088 | https://nvd.nist.gov/vuln/search |
| SnakeYaml | CVE-2022-41854, CVE-2022-38750,CVE-2022-38751, CVE-2022-38749, CVE-2022-25857, CVE-2022-1471, CVE-2022-38752 | https://nvd.nist.gov/vuln/search |
| SSH | CVE-2023-46445, CVE-2023-46446 | https://nvd.nist.gov/vuln/search |
| Wildfly | CVE-2020-14338 | https://nvd.nist.gov/vuln/search |
| XML External Entity | CVE-2014-3530 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46699 | Dell Data Protection Advisor, versions prior to 19.12, contains an Improper Neutralization of Special Elements Used in a Template Engine vulnerability in the Server. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46699 | Dell Data Protection Advisor, versions prior to 19.12, contains an Improper Neutralization of Special Elements Used in a Template Engine vulnerability in the Server. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
영향을 받는 제품 및 문제 해결
| Product | Affected Versions | Remediated Versions | Link to Update |
| Data Protection Advisor | Versions 19.9, 19.10 and 19.11 | Version 19.12 or later | Data Protection Advisor Downloads Area |
| Product | Affected Versions | Remediated Versions | Link to Update |
| Data Protection Advisor | Versions 19.9, 19.10 and 19.11 | Version 19.12 or later | Data Protection Advisor Downloads Area |
Notes:
- Dell recommends that you always upgrade to the latest release/version for your product.
- To request the workaround files that remove the affected OpenSSL-dependent libraries, or to receive assistance with applying the workaround, please contact Dell Customer Support.
해결 방법 및 완화 방안
| CVE ID | Workaround and Mitigation |
|
CVE-2024-5535, CVE-2023-3446 |
Pre-requisites:
For Linux:
# chmod 0777 unbundle_openssl_102_Libs_From_DPA
Note: Post execution the script will automatically remove libssl.so.1.0.0, libcrypto.so.1.0.0, dpaagent_modhparray, and dpaagent_modhpvls and exit.
For Windows:
Note: Post execution of the script will automatically remove libeay32.dll, ssleay32.dll, dpaagent_modhparray.exe, dpaagent_modhpvls.exe and exit. |
개정 내역
| Revision | Date | Description |
| 1.0 | 2025-02-06 | Initial Release |
| 2.0 | 2025-06-11 | Minor updates related to workaround and formatting |
| 3.0 | 2025-06-18 | Minor update related to workaround files availability |
| 4.0 | 2026-01-21 | Major update to include CVE-2025-46699 |
관련 정보
법적 고지 사항
해당 제품
Data Protection Advisor, Data Protection Suite Series문서 속성
문서 번호: 000281732
문서 유형: Dell Security Advisory
마지막 수정 시간: 21 1월 2026
다른 Dell 사용자에게 질문에 대한 답변 찾기
지원 서비스
디바이스에 지원 서비스가 적용되는지 확인하십시오.