{"id":364,"date":"2025-09-28T18:01:23","date_gmt":"2025-09-28T18:01:23","guid":{"rendered":"https:\/\/aldomonges.com\/aldomonges\/?p=364"},"modified":"2025-09-28T18:01:23","modified_gmt":"2025-09-28T18:01:23","slug":"actualizacion-de-seguridad-para-dell-powerprotect","status":"publish","type":"post","link":"https:\/\/aldomonges.com\/aldomonges\/?p=364","title":{"rendered":"Actualizaci\u00f3n de seguridad para Dell PowerProtect"},"content":{"rendered":"<p>Dell ha lanzado una actualizaci\u00f3n de seguridad para PowerProtect\u00a0Cyber\u00a0Recovery. Esta aborda m\u00faltiples vulnerabilidades en componentes de terceros.<\/p>\n<p><strong>Producto<\/strong><strong>s a<\/strong><strong>fectado<\/strong><strong>s<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li>Dell PowerProtect\u00a0Cyber\u00a0Recovery:<\/li>\n<li>Cyber\u00a0Recovery Software, versiones anteriores a 19.20.0.1.<\/li>\n<li>Cyber\u00a0Recovery SLES 15 SP4 OS Update\u00a0cyber-recovery-osupdate-15.4.0-9.bin, versiones anteriores a 15.4.0-9.<\/li>\n<li>Cyber\u00a0Recovery SLES 12 SP5 OS Update\u00a0cyber-recovery-osupdate-1.5.0-63.bin, versiones anteriores a 1.5.0-63.<\/li>\n<\/ul>\n<p><strong>Impacto<\/strong><\/p>\n<p><strong>Las vulnerabilidades de mayor severidad se han identificado como:<\/strong><\/p>\n<p><strong>CVE-202<\/strong><strong>4<\/strong><strong>\u2013<\/strong><strong>45491<\/strong><strong>:\u00a0<\/strong>con una puntuaci\u00f3n de 9.8 en CVSS v3.1. Se ha descubierto una vulnerabilidad en libexpat, versiones anteriores a 2.6.3. dtdCopy\u00a0en\u00a0xmlparse.c\u00a0podr\u00eda tener un desbordamiento de enteros para nDefaultAtts\u00a0en plataformas de 32 bits (donde UINT_MAX es igual a SIZE_MAX). Un actor malicioso podr\u00eda lograr la ejecuci\u00f3n arbitraria de c\u00f3digo.<\/p>\n<p><strong>CVE-202<\/strong><strong>4<\/strong><strong>\u2013<\/strong><strong>4549<\/strong><strong>2<\/strong><strong>:\u00a0<\/strong>con una puntuaci\u00f3n de 9.8 en CVSS v3.1. Se ha descubierto una vulnerabilidad en libexpat, versiones anteriores a 2.6.3. nextScaffoldPart\u00a0en\u00a0xmlparse.c\u00a0podr\u00eda tener un desbordamiento de enteros para m_groupSize\u00a0en plataformas de 32 bits (donde UINT_MAX es igual a SIZE_MAX). Un actor malicioso podr\u00eda lograr la ejecuci\u00f3n arbitraria de c\u00f3digo.<\/p>\n<p><strong>CVE-2025-<\/strong><strong>0<\/strong><strong>838<\/strong><strong>:\u00a0<\/strong>con una puntuaci\u00f3n de 9.8 en CVSS v3.1. Existe una vulnerabilidad de desbordamiento de enteros. Un actor malicioso podr\u00eda lograr la ejecuci\u00f3n arbitraria de c\u00f3digo.<\/p>\n<p><strong>Recomendaci\u00f3n<\/strong><\/p>\n<p>Actualizar a la \u00faltima versi\u00f3n disponible a trav\u00e9s del sitio web oficial del fabricante.<\/p>\n<p><strong>Referencias<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li>https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-45491<\/li>\n<li>https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-45492<\/li>\n<li>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-0838<\/li>\n<li>https:\/\/www.dell.com\/support\/kbdoc\/en-ca\/000369807\/dsa-2025-346-security-update-for-dell-powerprotect-cyber-recovery-multiple-third-party-component-vulnerabilities<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Dell ha lanzado una actualizaci\u00f3n de seguridad para PowerProtect\u00a0Cyber\u00a0Recovery. Esta aborda m\u00faltiples vulnerabilidades en componentes de terceros. Productos afectados Dell PowerProtect\u00a0Cyber\u00a0Recovery: Cyber\u00a0Recovery Software, versiones anteriores [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica"],"jetpack_featured_media_url":"https:\/\/i2.wp.com\/infohub.delltechnologies.com\/static\/media\/9198938f-8c47-5a0e-82d9-6db6a62cd3f7\/dca2ad06-80e7-4a5d-a85e-a11220a596e0\/out\/2913.005.png?w=552&resize=552,269&ssl=1","_links":{"self":[{"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=\/wp\/v2\/posts\/364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=364"}],"version-history":[{"count":1,"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=\/wp\/v2\/posts\/364\/revisions"}],"predecessor-version":[{"id":366,"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=\/wp\/v2\/posts\/364\/revisions\/366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=\/wp\/v2\/media\/365"}],"wp:attachment":[{"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aldomonges.com\/aldomonges\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}