CVE-2025-21120: CWE-650: Trusting HTTP Permission Methods on the Server Side in Dell Avamar Data Store Gen4T
Dell Avamar, versions prior to 19.12 with patch 338905, excluding version 19.10SP1 with patch 338904, contains a Trusting HTTP Permission Methods on the Server-Side vulnerability in Security. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
AI Analysis
Technical Summary
CVE-2025-21120 is a high-severity vulnerability affecting Dell Avamar Data Store Gen4T, specifically versions prior to 19.12 with patch 338905, excluding version 19.10SP1 with patch 338904. The vulnerability is categorized under CWE-650, which involves trusting HTTP permission methods on the server side. This means that the server improperly trusts the HTTP methods or permissions indicated by the client, potentially allowing a low-privileged remote attacker to exploit this flaw. By manipulating HTTP permission methods, the attacker could gain unauthorized access to sensitive information stored or processed by the Avamar Data Store. The vulnerability does not require user interaction and can be exploited remotely with low complexity, given that the attacker only needs low privileges to initiate the attack. The CVSS v3.1 base score is 8.3, reflecting high impact on confidentiality and integrity, with a lower impact on availability. The vulnerability allows an attacker to expose sensitive data, which could include backup data or configuration details, compromising the confidentiality and integrity of the system. Although no known exploits are currently reported in the wild, the potential for information exposure makes this a critical issue for organizations relying on Dell Avamar for data backup and recovery. The lack of patch links suggests that organizations must verify their patch status carefully and apply the appropriate updates to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Dell Avamar in enterprise backup and data protection environments. Exposure of sensitive backup data could lead to data breaches involving personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The integrity compromise could undermine trust in backup data, affecting disaster recovery and business continuity plans. Additionally, information exposure could facilitate further attacks, such as targeted phishing or lateral movement within networks. The vulnerability’s remote exploitability and low privilege requirement increase the risk of exploitation by insider threats or external attackers who have gained limited access. Given the critical role of backup systems in maintaining data availability and integrity, exploitation could disrupt operations and lead to costly incident response efforts.
Mitigation Recommendations
European organizations should immediately verify the version and patch level of their Dell Avamar Data Store Gen4T installations. Applying the official patches—specifically patch 338905 for versions prior to 19.12 or patch 338904 for version 19.10SP1—is essential. In the absence of available patches, organizations should implement network-level controls to restrict access to the Avamar management interfaces, limiting exposure to trusted administrative networks only. Employing Web Application Firewalls (WAFs) to monitor and block suspicious HTTP methods or malformed requests can provide an additional layer of defense. Regularly auditing access logs for unusual HTTP method usage or unauthorized access attempts is recommended. Furthermore, organizations should review and enforce strict access controls and least privilege principles for users interacting with the Avamar system. Conducting penetration testing focused on HTTP method handling can help identify residual risks. Finally, maintaining up-to-date backups and validating their integrity ensures resilience in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-21120: CWE-650: Trusting HTTP Permission Methods on the Server Side in Dell Avamar Data Store Gen4T
Description
Dell Avamar, versions prior to 19.12 with patch 338905, excluding version 19.10SP1 with patch 338904, contains a Trusting HTTP Permission Methods on the Server-Side vulnerability in Security. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
AI-Powered Analysis
Technical Analysis
CVE-2025-21120 is a high-severity vulnerability affecting Dell Avamar Data Store Gen4T, specifically versions prior to 19.12 with patch 338905, excluding version 19.10SP1 with patch 338904. The vulnerability is categorized under CWE-650, which involves trusting HTTP permission methods on the server side. This means that the server improperly trusts the HTTP methods or permissions indicated by the client, potentially allowing a low-privileged remote attacker to exploit this flaw. By manipulating HTTP permission methods, the attacker could gain unauthorized access to sensitive information stored or processed by the Avamar Data Store. The vulnerability does not require user interaction and can be exploited remotely with low complexity, given that the attacker only needs low privileges to initiate the attack. The CVSS v3.1 base score is 8.3, reflecting high impact on confidentiality and integrity, with a lower impact on availability. The vulnerability allows an attacker to expose sensitive data, which could include backup data or configuration details, compromising the confidentiality and integrity of the system. Although no known exploits are currently reported in the wild, the potential for information exposure makes this a critical issue for organizations relying on Dell Avamar for data backup and recovery. The lack of patch links suggests that organizations must verify their patch status carefully and apply the appropriate updates to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Dell Avamar in enterprise backup and data protection environments. Exposure of sensitive backup data could lead to data breaches involving personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The integrity compromise could undermine trust in backup data, affecting disaster recovery and business continuity plans. Additionally, information exposure could facilitate further attacks, such as targeted phishing or lateral movement within networks. The vulnerability’s remote exploitability and low privilege requirement increase the risk of exploitation by insider threats or external attackers who have gained limited access. Given the critical role of backup systems in maintaining data availability and integrity, exploitation could disrupt operations and lead to costly incident response efforts.
Mitigation Recommendations
European organizations should immediately verify the version and patch level of their Dell Avamar Data Store Gen4T installations. Applying the official patches—specifically patch 338905 for versions prior to 19.12 or patch 338904 for version 19.10SP1—is essential. In the absence of available patches, organizations should implement network-level controls to restrict access to the Avamar management interfaces, limiting exposure to trusted administrative networks only. Employing Web Application Firewalls (WAFs) to monitor and block suspicious HTTP methods or malformed requests can provide an additional layer of defense. Regularly auditing access logs for unusual HTTP method usage or unauthorized access attempts is recommended. Furthermore, organizations should review and enforce strict access controls and least privilege principles for users interacting with the Avamar system. Conducting penetration testing focused on HTTP method handling can help identify residual risks. Finally, maintaining up-to-date backups and validating their integrity ensures resilience in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- dell
- Date Reserved
- 2024-11-23T06:04:00.843Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6891004dad5a09ad00e2bbcb
Added to database: 8/4/2025, 6:47:41 PM
Last enriched: 8/12/2025, 12:45:12 AM
Last updated: 9/3/2025, 7:22:29 PM
Views: 16
Related Threats
CVE-2025-58361: CWE-20: Improper Input Validation in MarceloTessaro promptcraft-forge-studio
CriticalCVE-2025-58353: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MarceloTessaro promptcraft-forge-studio
HighCVE-2025-32322: Elevation of privilege in Google Android
HighCVE-2025-22415: Elevation of privilege in Google Android
HighCVE-2025-22414: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.