Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

DSA-2024-022: Security Update for Dell NetWorker vProxy Multiple Component Vulnerabilities

Summary: Dell NetWorker vProxy remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

This article applies to   This article does not apply to 

Impact

Critical

Details

Third-party Component CVEs More Information
bind CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
Linux kernel CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
libfastjson CVE-2020-12762 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
glib2 CVE-2024-34397 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
ucode-intel CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
glibc CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
python CVE-2022-48560, CVE-2023-27043, CVE-2023-52425, CVE-2024-0450 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
SUSE Manager Client Tools
Beta
CVE-2016-9566, CVE-2019-3698 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
less CVE-2024-32487 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
krb5 CVE-2021-37750 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
curl CVE-2023-38545 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker vProxy vProxy OVA Versions 19.10 through 19.10.0.3
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.9 through 19.9.0.7
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.8 through 19.8.0.4 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions prior to 19.8 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker vProxy vProxy OVA Versions 19.10 through 19.10.0.3
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.9 through 19.9.0.7
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.8 through 19.8.0.4 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions prior to 19.8 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
  1. Platforms: Windows & Linux (All variants and flavors are impacted)
  2. Versions prior to 19.8 mean versions 19.7.x, 19.6.x, 19.5.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
  3. Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
  4. Dell advises that you consistently upgrade to the most recent release/version of your product.
  5. The security advisory has been updated in light of the release of Version 19.10.0.4, customers have the option to upgrade to any of the versions/releases specified in the "Affected Products and Remediation" section
  6. NOTE: Dell NetWorker vProxy 4.4.0-3 OVA is built on SUSE Linux Enterprise Server 15 SP4

Revision History

RevisionDateDescription
1.02024-07-03 Initial Release
2.02024-07-31The security advisory has been updated in light of the release of Version 19.10.0.4

Related Information

Affected Products

NetWorker Family, NetWorker, NetWorker Series, NetWorker Module, Product Security Information
Article Properties
Article Number: 000226633
Article Type: Dell Security Advisory
Last Modified: 31 Jul 2024
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.
Article Properties
Article Number: 000226633
Article Type: Dell Security Advisory
Last Modified: 31 Jul 2024
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.