CVE-2025-21104: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Dell NetWorker
Dell NetWorker, versions prior to 19.11.0.4 and version 19.12, contains an URL Redirection to Untrusted Site ('Open Redirect') Vulnerability in NetWorker Management Console. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
AI Analysis
Technical Summary
CVE-2025-21104 is classified as a CWE-601 'URL Redirection to Untrusted Site' vulnerability affecting Dell NetWorker Management Console in versions prior to 19.11.0.4 and version 19.12. The vulnerability allows an unauthenticated attacker with remote access to craft URLs that cause the application to redirect targeted users to arbitrary external websites. This open redirect flaw arises because the application fails to properly validate or restrict redirect URLs, enabling attackers to exploit the trust users place in the legitimate NetWorker interface. While the vulnerability does not directly compromise confidentiality, integrity, or availability of the NetWorker system itself, it can be leveraged to conduct sophisticated phishing campaigns. Attackers can send malicious links appearing to originate from a trusted Dell NetWorker console, increasing the likelihood that users will disclose credentials or other sensitive data on attacker-controlled sites. The vulnerability requires no authentication but does require user interaction to follow the malicious redirect. The CVSS v3.1 base score is 4.3, reflecting network attack vector, low complexity, no privileges required, but user interaction needed and limited confidentiality impact. No public exploits have been reported to date, but the vulnerability is publicly disclosed and should be considered a phishing enabler rather than a direct system compromise vector.
Potential Impact
For European organizations, the primary impact of CVE-2025-21104 is an increased risk of successful phishing attacks targeting users of Dell NetWorker Management Console. This could lead to credential theft, unauthorized access to internal systems, or data leakage if users are tricked into submitting sensitive information on malicious sites. While the vulnerability does not directly affect the availability or integrity of backup operations, compromised credentials or session tokens obtained via phishing could indirectly lead to broader security incidents, including ransomware or data exfiltration. Organizations in sectors with high reliance on data backup and recovery, such as finance, healthcare, and critical infrastructure, may face elevated risks. The vulnerability's exploitation could also undermine user trust in IT management tools, complicating incident response and recovery efforts. Given the remote and unauthenticated nature of the vulnerability, attackers can target users across multiple organizations without needing prior access, increasing the threat surface.
Mitigation Recommendations
To mitigate CVE-2025-21104, European organizations should: 1) Immediately upgrade Dell NetWorker Management Console to versions later than 19.11.0.4 or versions where the vulnerability is patched, as Dell’s official patch or update becomes available. 2) Implement strict URL validation and filtering on any web proxies or gateways that handle traffic to the NetWorker console, blocking suspicious redirect URLs. 3) Educate users on recognizing phishing attempts, especially those involving links originating from trusted internal tools. 4) Employ multi-factor authentication (MFA) on NetWorker Management Console access to reduce the impact of credential compromise. 5) Monitor logs for unusual redirect URL patterns or unexpected user navigation events. 6) Consider deploying web isolation or browser security tools that can contain malicious redirects. 7) If patching is delayed, restrict remote access to the NetWorker Management Console to trusted networks or VPNs to reduce exposure. These targeted measures go beyond generic advice by focusing on the specific attack vector and user behavior exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-21104: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Dell NetWorker
Description
Dell NetWorker, versions prior to 19.11.0.4 and version 19.12, contains an URL Redirection to Untrusted Site ('Open Redirect') Vulnerability in NetWorker Management Console. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-21104 is classified as a CWE-601 'URL Redirection to Untrusted Site' vulnerability affecting Dell NetWorker Management Console in versions prior to 19.11.0.4 and version 19.12. The vulnerability allows an unauthenticated attacker with remote access to craft URLs that cause the application to redirect targeted users to arbitrary external websites. This open redirect flaw arises because the application fails to properly validate or restrict redirect URLs, enabling attackers to exploit the trust users place in the legitimate NetWorker interface. While the vulnerability does not directly compromise confidentiality, integrity, or availability of the NetWorker system itself, it can be leveraged to conduct sophisticated phishing campaigns. Attackers can send malicious links appearing to originate from a trusted Dell NetWorker console, increasing the likelihood that users will disclose credentials or other sensitive data on attacker-controlled sites. The vulnerability requires no authentication but does require user interaction to follow the malicious redirect. The CVSS v3.1 base score is 4.3, reflecting network attack vector, low complexity, no privileges required, but user interaction needed and limited confidentiality impact. No public exploits have been reported to date, but the vulnerability is publicly disclosed and should be considered a phishing enabler rather than a direct system compromise vector.
Potential Impact
For European organizations, the primary impact of CVE-2025-21104 is an increased risk of successful phishing attacks targeting users of Dell NetWorker Management Console. This could lead to credential theft, unauthorized access to internal systems, or data leakage if users are tricked into submitting sensitive information on malicious sites. While the vulnerability does not directly affect the availability or integrity of backup operations, compromised credentials or session tokens obtained via phishing could indirectly lead to broader security incidents, including ransomware or data exfiltration. Organizations in sectors with high reliance on data backup and recovery, such as finance, healthcare, and critical infrastructure, may face elevated risks. The vulnerability's exploitation could also undermine user trust in IT management tools, complicating incident response and recovery efforts. Given the remote and unauthenticated nature of the vulnerability, attackers can target users across multiple organizations without needing prior access, increasing the threat surface.
Mitigation Recommendations
To mitigate CVE-2025-21104, European organizations should: 1) Immediately upgrade Dell NetWorker Management Console to versions later than 19.11.0.4 or versions where the vulnerability is patched, as Dell’s official patch or update becomes available. 2) Implement strict URL validation and filtering on any web proxies or gateways that handle traffic to the NetWorker console, blocking suspicious redirect URLs. 3) Educate users on recognizing phishing attempts, especially those involving links originating from trusted internal tools. 4) Employ multi-factor authentication (MFA) on NetWorker Management Console access to reduce the impact of credential compromise. 5) Monitor logs for unusual redirect URL patterns or unexpected user navigation events. 6) Consider deploying web isolation or browser security tools that can contain malicious redirects. 7) If patching is delayed, restrict remote access to the NetWorker Management Console to trusted networks or VPNs to reduce exposure. These targeted measures go beyond generic advice by focusing on the specific attack vector and user behavior exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dell
- Date Reserved
- 2024-11-22T06:42:03.816Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69901848c9e1ff5ad867f2b4
Added to database: 2/14/2026, 6:38:00 AM
Last enriched: 2/14/2026, 6:40:02 AM
Last updated: 2/21/2026, 2:16:45 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.