DSA-2025-387: Security Update for Dell CloudBoost Virtual Appliance Multiple Vulnerabilities
Сводка: Dell CloudBoost Virtual Appliance remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Данная статья применяется к
Данная статья не применяется к
Эта статья не привязана к какому-либо конкретному продукту.
В этой статье указаны не все версии продуктов.
Влияние
Critical
Подробные сведения
| Third-party Component | CVEs | More Information |
| Bind | CVE-2024-11187, CVE-2024-12705 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2024-0853 | https://nvd.nist.gov/vuln/search |
| Django | CVE-2025-32873, CVE-2025-48432 | https://nvd.nist.gov/vuln/search |
| GNU elfutils | CVE-2025-1377, CVE-2024-25260, CVE-2025-1371, CVE-2025-1365, CVE-2025-1372 | https://nvd.nist.gov/vuln/search |
| Expat | CVE-2024-8176 | https://nvd.nist.gov/vuln/search |
| FreeType | CVE-2025-27363 | https://nvd.nist.gov/vuln/search |
| GLib | CVE-2025-4373 | https://nvd.nist.gov/vuln/search |
| GNU C Library | CVE-2025-4802 | https://nvd.nist.gov/vuln/search |
| GnuPG | CVE-2025-30258 | https://nvd.nist.gov/vuln/search |
| HAProxy | CVE-2025-32464 | https://nvd.nist.gov/vuln/search |
| Intel Microcode | CVE-2024-45332, CVE-2025-24495, CVE-2025-20623, CVE-2025-20103, CVE-2025-20054, CVE-2024-43420, CVE-2024-28956, CVE-2025-20012 | https://nvd.nist.gov/vuln/search |
| Oracle Java SE | CVE-2025-30691, CVE-2024-47606, CVE-2025-21587, CVE-2025-30698, CVE-2024-54534, CVE-2025-23083, CVE-2025-24162, CVE-2025-24158, CVE-2025-24150, CVE-2025-24143, CVE-2025-23085, CVE-2025-23084, CVE-2024-54543, CVE-2024-54508, CVE-2024-54505, CVE-2024-54502, CVE-2024-54479, CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775, CVE-2024-47597, CVE-2024-47596, CVE-2024-47546, CVE-2024-47545, CVE-2024-47544, CVE-2024-44309, CVE-2024-44308, CVE-2024-44296, CVE-2024-44244, CVE-2024-44187, CVE-2024-44185, CVE-2024-40866, CVE-2024-27856 | https://nvd.nist.gov/vuln/search |
| Kerberos | CVE-2025-3576 | https://nvd.nist.gov/vuln/search |
| libxml2 | CVE-2025-32415, CVE-2025-32414 | https://nvd.nist.gov/vuln/search |
| Libxslt | CVE-2024-55549, CVE-2025-24855 | https://nvd.nist.gov/vuln/search |
| Linux kernel | CVE-2023-52664, CVE-2023-52927, CVE-2024-57977, CVE-2025-21760, CVE-2024-57979, CVE-2025-21731, CVE-2024-58052,CVE-2025-21744, CVE-2025-21887, CVE-2024-58072, CVE-2025-21802, CVE-2025-21943,CVE-2025-21722, CVE-2025-21814, CVE-2025-21811, CVE-2025-21878, CVE-2025-21917,CVE-2025-21715, CVE-2025-21711, CVE-2025-21804, CVE-2024-58002, CVE-2025-21785,CVE-2025-21795, CVE-2024-58055, CVE-2024-58071, CVE-2025-21728, CVE-2025-21749,CVE-2025-21858, CVE-2025-21721, CVE-2025-21727, CVE-2024-58020, CVE-2025-21866,CVE-2025-21912, CVE-2025-21781, CVE-2024-58007, CVE-2025-21806, CVE-2025-21950,CVE-2025-21844, CVE-2025-21924, CVE-2024-57986, CVE-2024-57980, CVE-2025-21772,CVE-2025-21926, CVE-2025-21823, CVE-2025-21726, CVE-2025-21753, CVE-2025-21708,CVE-2024-58014, CVE-2025-21779, CVE-2024-56599, CVE-2024-58063, CVE-2025-21830,CVE-2025-21748, CVE-2025-21909, CVE-2024-58058, CVE-2025-21826, CVE-2025-21910,CVE-2025-21776, CVE-2025-21871, CVE-2025-21791, CVE-2024-58076, CVE-2024-58085,CVE-2024-58090, CVE-2024-58010, CVE-2025-21848, CVE-2025-21835, CVE-2024-58017,CVE-2025-21761, CVE-2024-58051, CVE-2025-21898, CVE-2025-21971, CVE-2024-47726,CVE-2025-21718, CVE-2025-21684, CVE-2025-21735, CVE-2024-57978, CVE-2025-21758,CVE-2024-56721, CVE-2025-21764, CVE-2025-21951, CVE-2025-21820, CVE-2025-21922,CVE-2025-21736, CVE-2025-21862, CVE-2025-21719, CVE-2025-21846, CVE-2025-21934,CVE-2024-58001, CVE-2025-21904, CVE-2025-21865, CVE-2025-21787, CVE-2025-21763,CVE-2025-21919, CVE-2025-21647, CVE-2024-57981, CVE-2024-58016, CVE-2025-21766,CVE-2025-21914, CVE-2025-21916, CVE-2024-57973, CVE-2025-21765, CVE-2024-58083,CVE-2025-21925, CVE-2025-21796, CVE-2025-21920, CVE-2024-26982, CVE-2025-21782,CVE-2025-21704, CVE-2025-21767, CVE-2024-58069, CVE-2025-21877, CVE-2025-21799,CVE-2025-21935, CVE-2025-21905, CVE-2024-58005, CVE-2024-58086, CVE-2025-21928,CVE-2024-58079, CVE-2025-21762, CVE-2025-21745, CVE-2025-21875, CVE-2025-21707,CVE-2024-58034, CVE-2025-21948, CVE-2024-57834, CVE-2025-21859, CVE-2024-53168, CVE-2024-56551, CVE-2024-56608 | https://nvd.nist.gov/vuln/search |
| MySQL | CVE-2025-30722, CVE-2025-30682, CVE-2025-30703, CVE-2025-21580, CVE-2025-30681,CVE-2025-21574, CVE-2025-30696, CVE-2025-21584, CVE-2025-21581, CVE-2025-30687,CVE-2025-30704, CVE-2025-30683, CVE-2025-30685, CVE-2025-30693, CVE-2025-30684,CVE-2025-21579, CVE-2025-30695, CVE-2025-30688, CVE-2025-30699, CVE-2025-30721,CVE-2025-21577, CVE-2025-30715, CVE-2025-30689, CVE-2025-21585, CVE-2025-21588,CVE-2025-30705, CVE-2025-21575 | https://nvd.nist.gov/vuln/search |
| Net-tools | CVE-2025-46836 | https://nvd.nist.gov/vuln/search |
| Open VM Tools | CVE-2025-22247 | https://nvd.nist.gov/vuln/search |
| Perl | CVE-2024-56406 | https://nvd.nist.gov/vuln/search |
| pykerberos | CVE-2015-3206 | https://nvd.nist.gov/vuln/search |
| Ruby | CVE-2025-27219, CVE-2024-39908, CVE-2024-43398, CVE-2024-41123, CVE-2025-27220, CVE-2025-25186, CVE-2025-27221, CVE-2024-35176 | https://nvd.nist.gov/vuln/search |
| SQLite | CVE-2025-29088, CVE-2025-3277, CVE-2025-29087 | https://nvd.nist.gov/vuln/search |
| Systemd | CVE-2025-4598 | https://nvd.nist.gov/vuln/search |
| Vim | CVE-2025-26603, CVE-2025-1215 | https://nvd.nist.gov/vuln/search |
| Zlib | CVE-2023-45853, CVE-2022-37434, CVE-2016-9841, CVE-2016-9843, CVE-2016-9842, CVE-2018-25032 | https://nvd.nist.gov/vuln/search |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
| CVE-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction of Excessive Authentication Attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access. | 7.0 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
Затронутые продукты и исправление
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions prior to 19.13.0.2 | Version 19.13.0.2 or later | CloudBoost Download Area |
Notes:
- The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Versions prior to 19.13.0.2 means version 19.13.0.0 and 19.12.x, 19.11.x, 19.10.x, and 19.9.x family of main releases that are still under standard support. For more information refer to Dell End-of-Life Product List for Converged Infrastructure and Storage.
- Unless specified as impacted, the term “later releases” encompasses all Dell CloudBoost Virtual Appliance releases, under standard support, that are of a higher minor or major version than the specified release. Dell recommends that you always upgrade to the latest release/version for your product.
Временные решения и снижение риска
None
История изменений
| Revision | Date | Description |
| 1.0 | 2025-12-01 | Initial Release |
Связанная информация
Правовая оговорка
Затронутые продукты
CloudBoost, CloudBoost Virtual ApplianceСвойства статьи
Номер статьи: 000397417
Тип статьи: Dell Security Advisory
Последнее изменение: 01 Dec 2025
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.