DSA-2025-427: Security Update for Dell Data Protection Central Multiple Third-Party Component Vulnerabilities

요약: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

이 문서는 다음에 적용됩니다. 이 문서는 다음에 적용되지 않습니다. 이 문서는 특정 제품과 관련이 없습니다. 모든 제품 버전이 이 문서에 나와 있는 것은 아닙니다.

영향

High

세부 정보

Third-party Component CVEs Addressed More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2021-4460, CVE-2022-36280, CVE-2022-43945, CVE-2022-48631, CVE-2022-50233, CVE-2022-50236, CVE-2022-50242, CVE-2022-50244, CVE-2022-50249, CVE-2022-50252, CVE-2022-50257, CVE-2022-50258, CVE-2022-50265, CVE-2022-50266, CVE-2022-50271, CVE-2022-50278, CVE-2022-50280, CVE-2022-50282, CVE-2022-50285, CVE-2022-50288, CVE-2022-50289, CVE-2022-50291, CVE-2022-50293, CVE-2022-50294, CVE-2022-50297, CVE-2022-50299, CVE-2022-50304, CVE-2022-50311, CVE-2022-50312, CVE-2022-50321, CVE-2022-50327, CVE-2022-50330, CVE-2022-50344, CVE-2022-50346, CVE-2022-50349, CVE-2022-50350, CVE-2022-50351, CVE-2022-50352, CVE-2022-50356, CVE-2022-50359, CVE-2022-50365, CVE-2022-50367, CVE-2022-50372, CVE-2022-50375, CVE-2022-50381, CVE-2022-50385, CVE-2022-50386, CVE-2022-50389, CVE-2022-50394, CVE-2022-50395, CVE-2022-50396, CVE-2022-50401, CVE-2022-50402, CVE-2022-50405, CVE-2022-50406, CVE-2022-50408, CVE-2022-50409, CVE-2022-50411, CVE-2022-50414, CVE-2022-50419, CVE-2022-50422, CVE-2022-50423, CVE-2022-50432, CVE-2022-50434, CVE-2022-50435, CVE-2022-50443, CVE-2022-50456, CVE-2022-50459, CVE-2022-50460, CVE-2022-50470, CVE-2022-50481, CVE-2022-50485, CVE-2022-50493, CVE-2022-50496, CVE-2022-50501, CVE-2022-50504, CVE-2022-50505, CVE-2022-50509, CVE-2022-50516, CVE-2022-50532, CVE-2022-50534, CVE-2022-50537, CVE-2022-50542, CVE-2022-50544, CVE-2022-50549, CVE-2022-50563, CVE-2022-50564, CVE-2022-50571, CVE-2022-50581, CVE-2023-1380, CVE-2023-28328, CVE-2023-3772, CVE-2023-39197, CVE-2023-53148, CVE-2023-53149, CVE-2023-53150, CVE-2023-53151, CVE-2023-53153, CVE-2023-53165, CVE-2023-53174, CVE-2023-53176, CVE-2023-53178, CVE-2023-53183, CVE-2023-53185, CVE-2023-53188, CVE-2023-53189, CVE-2023-53191, CVE-2023-53199, CVE-2023-53201, CVE-2023-53204, CVE-2023-53215, CVE-2023-53226, CVE-2023-53245, CVE-2023-53246, CVE-2023-53248, CVE-2023-53250, CVE-2023-53254, CVE-2023-53265, CVE-2023-53270, CVE-2023-53271, CVE-2023-53272, CVE-2023-53277, CVE-2023-53280, CVE-2023-53282, CVE-2023-53288, CVE-2023-53289, CVE-2023-53292, CVE-2023-53295, CVE-2023-53298, CVE-2023-53299, CVE-2023-53302, CVE-2023-53305, CVE-2023-53307, CVE-2023-53308, CVE-2023-53309, CVE-2023-53313, CVE-2023-53317, CVE-2023-53321, CVE-2023-53322, CVE-2023-53326, CVE-2023-53331, CVE-2023-53332, CVE-2023-53335, CVE-2023-53338, CVE-2023-53339, CVE-2023-53344, CVE-2023-53348, CVE-2023-53357, CVE-2023-53365, CVE-2023-53368, CVE-2023-53373, CVE-2023-53380, CVE-2023-53384, CVE-2023-53393, CVE-2023-53395, CVE-2023-53397, CVE-2023-53400, CVE-2023-53427, CVE-2023-53433, CVE-2023-53436, CVE-2023-53438, CVE-2023-53441, CVE-2023-53446, CVE-2023-53451, CVE-2023-53456, CVE-2023-53476, CVE-2023-53477, CVE-2023-53484, CVE-2023-53499, CVE-2023-53506, CVE-2023-53512, CVE-2023-53517, CVE-2023-53519, CVE-2023-53521, CVE-2023-53526, CVE-2023-53530, CVE-2023-53533, CVE-2023-53540, CVE-2023-53548, CVE-2023-53556, CVE-2023-53559, CVE-2023-53564, CVE-2023-53568, CVE-2023-53582, CVE-2023-53587, CVE-2023-53589, CVE-2023-53593, CVE-2023-53594, CVE-2023-53596, CVE-2023-53603, CVE-2023-53604, CVE-2023-53611, CVE-2023-53615, CVE-2023-53619, CVE-2023-53620, CVE-2023-53622, CVE-2023-53624, CVE-2023-53635, CVE-2023-53644, CVE-2023-53647, CVE-2023-53648, CVE-2023-53650, CVE-2023-53667, CVE-2023-53668, CVE-2023-53672, CVE-2023-53675, CVE-2023-53681, CVE-2023-53683, CVE-2023-53687, CVE-2023-53695, CVE-2023-53696, CVE-2023-53705, CVE-2023-53707, CVE-2023-53715, CVE-2023-53717, CVE-2023-53722, CVE-2023-53733, CVE-2023-7324, CVE-2024-25621, CVE-2024-40635, CVE-2024-53194, CVE-2024-58240, CVE-2025-11731, CVE-2025-31133, CVE-2025-38488, CVE-2025-38527, CVE-2025-38539, CVE-2025-38553, CVE-2025-38572, CVE-2025-38574, CVE-2025-38602, CVE-2025-38604, CVE-2025-38623, CVE-2025-38624, CVE-2025-38632, CVE-2025-38639, CVE-2025-38665, CVE-2025-38680, CVE-2025-38685, CVE-2025-38691, CVE-2025-38695, CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702, CVE-2025-38705, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38718, CVE-2025-38724, CVE-2025-38729, CVE-2025-38735, CVE-2025-39676, CVE-2025-39677, CVE-2025-39691, CVE-2025-39702, CVE-2025-39705, CVE-2025-39706, CVE-2025-39724, CVE-2025-39726, CVE-2025-39751, CVE-2025-39754, CVE-2025-39756, CVE-2025-39757, CVE-2025-39760, CVE-2025-39763, CVE-2025-39764, CVE-2025-39772, CVE-2025-39773, CVE-2025-39782, CVE-2025-39787, CVE-2025-39800, CVE-2025-39808, CVE-2025-39812, CVE-2025-39813, CVE-2025-39824, CVE-2025-39833, CVE-2025-39838, CVE-2025-39841, CVE-2025-39847, CVE-2025-39853, CVE-2025-39860, CVE-2025-39863, CVE-2025-39865, CVE-2025-39866, CVE-2025-39869, CVE-2025-39876, CVE-2025-39885, CVE-2025-39898, CVE-2025-39911, CVE-2025-39923, CVE-2025-39929, CVE-2025-39931, CVE-2025-39945, CVE-2025-39949, CVE-2025-39955, CVE-2025-39967, CVE-2025-39968, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39997, CVE-2025-40018, CVE-2025-40044, CVE-2025-40049, CVE-2025-40078, CVE-2025-40082, CVE-2025-40088, CVE-2025-40300, CVE-2025-40778, CVE-2025-41244, CVE-2025-52565, CVE-2025-52881, CVE-2025-53057, CVE-2025-53066, CVE-2025-53905, CVE-2025-53906, CVE-2025-55157, CVE-2025-55158, CVE-2025-59375, CVE-2025-61984, CVE-2025-64329, CVE-2025-9230 suse.comThis hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies는 모든 고객이 CVSS 기본 점수와 관련 임시 및 환경 점수를 모두 고려할 것을 권장합니다. 이 경우 특정 보안 취약성과 관련된 잠재적인 심각도에 영향을 미칠 수 있습니다.

영향을 받는 제품 및 문제 해결

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Versions 19.9 through 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.25-1 Versions 19.9 through 19.12 with Data Protection Central OS Update dpc-osupdate- 1.1.25-1 Apply Latest Data Protection Central OS Update
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) Data Protection Central OS Update for Power Protect DP Series Appliances Versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.25-1 Version 2.7.9 with Data Protection Central OS Update dpc-osupdate- 1.1.25-1 Apply Latest Data Protection Central OS Update
Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Versions 19.9 through 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.25-1 Versions 19.9 through 19.12 with Data Protection Central OS Update dpc-osupdate- 1.1.25-1 Apply Latest Data Protection Central OS Update
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) Data Protection Central OS Update for Power Protect DP Series Appliances Versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.25-1 Version 2.7.9 with Data Protection Central OS Update dpc-osupdate- 1.1.25-1 Apply Latest Data Protection Central OS Update
  1. Platform: SUSE Linux Enterprise Server 12 SP5
  2. The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.25-1

To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.

See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers  (Link will be updated once the release is done)

See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs  (Link will be updated once the release is done)

The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.25-1

NOTE: To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer to DPC: Fixing DPC IAM Service Failure Due to Docker Port Configuration Issue | Dell US before applying the update.

개정 내역

RevisionDateDescription
1.02025-12-22Initial Release
2.02025-12-22Updated for enhanced presentation with no changes to content

관련 정보

해당 제품

PowerProtect Data Protection Appliance, Data Protection Central, Data Protection Suite Series, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software
문서 속성
문서 번호: 000406763
문서 유형: Dell Security Advisory
마지막 수정 시간: 22 12월 2025
다른 Dell 사용자에게 질문에 대한 답변 찾기
지원 서비스
디바이스에 지원 서비스가 적용되는지 확인하십시오.