DSA-2025-450: Security Update for Dell NetWorker Virtual Edition OpenSSL Vulnerability

Сводка: Dell Networker Virtual Edition remediation is available for an OpenSSL vulnerability that could be exploited by malicious users to compromise the affected system.

Данная статья применяется к Данная статья не применяется к Эта статья не привязана к какому-либо конкретному продукту. В этой статье указаны не все версии продуктов.

Влияние

Medium

Дополнительные сведения

This Security Advisory communicates vulnerabilities affecting versions prior to 19.13 which can be remediated by upgrading to version 19.13 or applying the mitigation steps outlined in the “Workarounds and Mitigation” section, if an immediate upgrade is not possible.

Подробные сведения

Third-party Component CVEs More Information
OpenSSL CVE-2023-48795 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell рекомендует всем клиентам учитывать как базовую оценку CVSS, так и любые временные и обусловленные средой оценки, которые могут повлиять на потенциальную степень серьезности конкретной уязвимости.

Затронутые продукты и исправление

Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker Networker Virtual Edition Versions prior to 19.13 Version 19.13 or later NetWorker Downloads Area

 

Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker Networker Virtual Edition Versions prior to 19.13 Version 19.13 or later NetWorker Downloads Area

 

Notes:

  1. The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
  2. Versions prior to 19.13 means 19.12.x, 19.11.x, 19.10.x, and 19.9.x family of releases that are still under standard support. For more information refer to Dell End-of-Life Product List for Converged Infrastructure and Storage.
  3. Unless specified as impacted, the term “later releases” encompasses all NetWorker Virtual Edition releases, under standard support, that are of a higher minor or major version than the specified release. Dell recommends that you always upgrade to the latest release/version for your product.

Временные решения и снижение риска

CVE ID Workaround and Mitigation
CVE-2023-48795

To mitigate the vulnerability without upgrading, perform the following steps to disable ChaCha20-Poly1305:

 

  • Open /etc/ssh/sshd_config and add the following line to remove the cipher:
Ciphers -chacha20-poly1305@openssh.com
  • Restart the SSH daemon service by running the following command via CLI:
sudo systemctl restart ss (Alternatively: sudo service sshd restart)
  • Verify the cipher is disabled by executing:
ssh -Q cipher | grep ch

(The output should not include -chacha20-poly1305@openssh.com)

 

История изменений

RevisionDateDescription
1.02025-12-19Initial Release

 

Связанная информация

Затронутые продукты

NetWorker Family, NetWorker
Свойства статьи
Номер статьи: 000405768
Тип статьи: Dell Security Advisory
Последнее изменение: 19 Dec 2025
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.