DSA-2026-173: Security Update for Dell Data Protection Central Multiple Third-Party Component Vulnerabilities

Summary: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Bu makale şunlar için geçerlidir: Bu makale şunlar için geçerli değildir: Bu makale, belirli bir ürüne bağlı değildir. Bu makalede tüm ürün sürümleri tanımlanmamıştır.

Impact

Critical

Ek Ayrıntılar

This Security Advisory applies to Data Protection Central versions 19.9.x, 19.10.x, 19.11.x., 19.12.x This Security Advisory applies to IDPA version 2.7.9

Details

Third-party Component CVEs Addressed More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2014-0333, CVE-2014-9495, CVE-2015-0973, CVE-2015-8126, CVE-2022-49604, CVE-2022-50347, CVE-2022-50364, CVE-2022-50368, CVE-2022-50453, CVE-2022-50494, CVE-2022-50527, CVE-2022-50545, CVE-2022-50551, CVE-2022-50569, CVE-2022-50578, CVE-2022-50580, CVE-2022-50615, CVE-2022-50625, CVE-2022-50630, CVE-2022-50636, CVE-2022-50638, CVE-2022-50640, CVE-2022-50643, CVE-2022-50646, CVE-2022-50656, CVE-2022-50668, CVE-2022-50676, CVE-2022-50677, CVE-2022-50678, CVE-2022-50697, CVE-2022-50700, CVE-2022-50709, CVE-2022-50715, CVE-2022-50716, CVE-2022-50717, CVE-2022-50719, CVE-2022-50728, CVE-2022-50730, CVE-2022-50733, CVE-2022-50740, CVE-2022-50744, CVE-2022-50747, CVE-2022-50749, CVE-2022-50751, CVE-2022-50755, CVE-2022-50760, CVE-2022-50761, CVE-2022-50770, CVE-2022-50777, CVE-2022-50779, CVE-2022-50780, CVE-2022-50782, CVE-2022-50786, CVE-2022-50816, CVE-2022-50821, CVE-2022-50824, CVE-2022-50834, CVE-2022-50840, CVE-2022-50849, CVE-2022-50850, CVE-2022-50859, CVE-2022-50865, CVE-2022-50868, CVE-2022-50870, CVE-2022-50880, CVE-2022-50881, CVE-2022-50884, CVE-2022-50885, CVE-2022-50887, CVE-2023-20569, CVE-2023-4132, CVE-2023-50756, CVE-2023-53229, CVE-2023-53369, CVE-2023-53431, CVE-2023-53454, CVE-2023-53464, CVE-2023-53542, CVE-2023-53597, CVE-2023-53618, CVE-2023-53641, CVE-2023-53676, CVE-2023-53685, CVE-2023-53718, CVE-2023-53746, CVE-2023-53747, CVE-2023-53748, CVE-2023-53751, CVE-2023-53754, CVE-2023-53765, CVE-2023-53781, CVE-2023-53786, CVE-2023-53788, CVE-2023-53794, CVE-2023-53802, CVE-2023-53803, CVE-2023-53808, CVE-2023-53816, CVE-2023-53817, CVE-2023-53819, CVE-2023-53825, CVE-2023-53827, CVE-2023-53832, CVE-2023-53840, CVE-2023-53847, CVE-2023-53850, CVE-2023-53853, CVE-2023-53862, CVE-2023-53863, CVE-2023-53992, CVE-2023-54012, CVE-2023-54014, CVE-2023-54017, CVE-2023-54021, CVE-2023-54032, CVE-2023-54045, CVE-2023-54047, CVE-2023-54048, CVE-2023-54051, CVE-2023-54067, CVE-2023-54070, CVE-2023-54091, CVE-2023-54095, CVE-2023-54108, CVE-2023-54111, CVE-2023-54112, CVE-2023-54118, CVE-2023-54119, CVE-2023-54120, CVE-2023-54121, CVE-2023-54123, CVE-2023-54130, CVE-2023-54134, CVE-2023-54168, CVE-2023-54170, CVE-2023-54177, CVE-2023-54179, CVE-2023-54184, CVE-2023-54186, CVE-2023-54197, CVE-2023-54198, CVE-2023-54202, CVE-2023-54207, CVE-2023-54211, CVE-2023-54213, CVE-2023-54214, CVE-2023-54218, CVE-2023-54224, CVE-2023-54226, CVE-2023-54230, CVE-2023-54236, CVE-2023-54243, CVE-2023-54260, CVE-2023-54264, CVE-2023-54265, CVE-2023-54266, CVE-2023-54271, CVE-2023-54274, CVE-2023-54282, CVE-2023-54286, CVE-2023-54287, CVE-2023-54289, CVE-2023-54294, CVE-2023-54300, CVE-2023-54309, CVE-2023-54311, CVE-2023-54317, CVE-2023-54321, CVE-2023-6040, CVE-2024-26935, CVE-2024-41007, CVE-2024-56690, CVE-2024-58020, CVE-2025-10158, CVE-2025-11468, CVE-2025-12084, CVE-2025-13601, CVE-2025-13836, CVE-2025-13837, CVE-2025-14017, CVE-2025-14087, CVE-2025-14512, CVE-2025-14524, CVE-2025-14819, CVE-2025-15079, CVE-2025-15281, CVE-2025-15282, CVE-2025-15366, CVE-2025-15367, CVE-2025-21681, CVE-2025-21738, CVE-2025-22083, CVE-2025-22125, CVE-2025-31648, CVE-2025-38085, CVE-2025-38336, CVE-2025-38436, CVE-2025-38591, CVE-2025-38728, CVE-2025-39748, CVE-2025-39817, CVE-2025-39819, CVE-2025-39913, CVE-2025-39964, CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40027, CVE-2025-40030, CVE-2025-40035, CVE-2025-40040, CVE-2025-40048, CVE-2025-40053, CVE-2025-40055, CVE-2025-40064, CVE-2025-40070, CVE-2025-40074, CVE-2025-40075, CVE-2025-40081, CVE-2025-40083, CVE-2025-40099, CVE-2025-40103, CVE-2025-40110, CVE-2025-40115, CVE-2025-40123, CVE-2025-40135, CVE-2025-40139, CVE-2025-40149, CVE-2025-40153, CVE-2025-40158, CVE-2025-40160, CVE-2025-40164, CVE-2025-40167, CVE-2025-40168, CVE-2025-40170, CVE-2025-40173, CVE-2025-40178, CVE-2025-40186, CVE-2025-40198, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205, CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40233, CVE-2025-40240, CVE-2025-40242, CVE-2025-40244, CVE-2025-40248, CVE-2025-40252, CVE-2025-40259, CVE-2025-40261, CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40275, CVE-2025-40278, CVE-2025-40279, CVE-2025-40283, CVE-2025-40304, CVE-2025-40308, CVE-2025-40321, CVE-2025-40322, CVE-2025-40323, CVE-2025-40331, CVE-2025-40337, CVE-2025-40339, CVE-2025-40342, CVE-2025-40345, CVE-2025-40349, CVE-2025-40351, CVE-2025-40363, CVE-2025-4330, CVE-2025-4373, CVE-2025-4598, CVE-2025-6075, CVE-2025-64505, CVE-2025-64506, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2025-68160, CVE-2025-68188, CVE-2025-68190, CVE-2025-68192, CVE-2025-68206, CVE-2025-68223, CVE-2025-68234, CVE-2025-68241, CVE-2025-68245, CVE-2025-68261, CVE-2025-68264, CVE-2025-68283, CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68295, CVE-2025-68296, CVE-2025-68303, CVE-2025-68305, CVE-2025-68312, CVE-2025-68337, CVE-2025-68340, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68366, CVE-2025-68367, CVE-2025-68372, CVE-2025-68379, CVE-2025-68615, CVE-2025-68724, CVE-2025-68740, CVE-2025-68757, CVE-2025-68767, CVE-2025-68771, CVE-2025-68774, CVE-2025-68783, CVE-2025-68788, CVE-2025-68795, CVE-2025-68797, CVE-2025-68813, CVE-2025-68816, CVE-2025-68818, CVE-2025-68973, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2025-7039, CVE-2025-71064, CVE-2025-71075, CVE-2025-71082, CVE-2025-71085, CVE-2025-71087, CVE-2025-71091, CVE-2025-71093, CVE-2025-71096, CVE-2025-71098, CVE-2025-71104, CVE-2025-71108, CVE-2025-71112, CVE-2025-71113, CVE-2025-71116, CVE-2025-71119, CVE-2025-71120, CVE-2025-71131, CVE-2025-71183, CVE-2025-71184, CVE-2025-71194, CVE-2025-71224, CVE-2025-71236, CVE-2025-8058, CVE-2025-8194, CVE-2025-8291, CVE-2026-0672, CVE-2026-0865, CVE-2026-0915, CVE-2026-0988, CVE-2026-1299, CVE-2026-1484, CVE-2026-1485, CVE-2026-1489, CVE-2026-1965, CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945, CVE-2026-22695, CVE-2026-22795, CVE-2026-22976, CVE-2026-22978, CVE-2026-22991, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23004, CVE-2026-23011, CVE-2026-23054, CVE-2026-23060, CVE-2026-23064, CVE-2026-23069, CVE-2026-23074, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23089, CVE-2026-23095, CVE-2026-23099, CVE-2026-23105, CVE-2026-23112, CVE-2026-23125, CVE-2026-23141, CVE-2026-23191, CVE-2026-23198, CVE-2026-23204, CVE-2026-23208, CVE-2026-23209, CVE-2026-25646, CVE-2026-25702, CVE-2026-26269, CVE-2026-27135, CVE-2026-28417, CVE-2026-3783, CVE-2026-3784, CVE-2026-4105 suse.comThis hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Etkilenen Ürünler ve Düzeltme

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update(SUSE SLES 12 SP5) Versions19.9through19.12with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1 Versions 19.9 through 19.12 with Data Protection Central OS Update dpc-osupdate- 1.1.26-1 Apply Latest Data Protection Central OS Update

PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance Data Protection Central OS Updatefor Power Protect DP Series Appliances Versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1 Version 2.7.9 with Data Protection Central OS Updatedpc-osupdate-1.1.26-1 Apply Latest Data Protection Central OS Update
Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update(SUSE SLES 12 SP5) Versions19.9through19.12with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1 Versions 19.9 through 19.12 with Data Protection Central OS Update dpc-osupdate- 1.1.26-1 Apply Latest Data Protection Central OS Update

PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance Data Protection Central OS Updatefor Power Protect DP Series Appliances Versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1 Version 2.7.9 with Data Protection Central OS Updatedpc-osupdate-1.1.26-1 Apply Latest Data Protection Central OS Update
  1. Platform: SUSE Linux Enterprise Server 12 SP5
  2. The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.26-1

To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.

See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers  (Link will be updated once the release is done)

See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs  (Link will be updated once the release is done)

The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:  version=1.1.26-1

NOTE: To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer to DPC: Fixing DPC IAM Service Failure Due to Docker Port Configuration Issue | Dell US before applying the update.

Revision History

RevisionDateDescription
1.02026-04-01Initial Release

 

Related Information

Etkilenen Ürünler

Data Protection Central, Data Protection Suite Series, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software

Ürünler

PowerProtect Data Protection Appliance
Makale Özellikleri
Article Number: 000449107
Article Type: Dell Security Advisory
Son Değiştirme: 06 Nis 2026
Sorularınıza diğer Dell kullanıcılarından yanıtlar bulun
Destek Hizmetleri
Aygıtınızın Destek Hizmetleri kapsamında olup olmadığını kontrol edin.