Skip to main content

CVE-2025-22479: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Dell Dell Storage Center - Dell Storage Manager

Low
VulnerabilityCVE-2025-22479cvecve-2025-22479cwe-22
Published: Tue May 06 2025 (05/06/2025, 15:46:45 UTC)
Source: CVE
Vendor/Project: Dell
Product: Dell Storage Center - Dell Storage Manager

Description

Dell Storage Center - Dell Storage Manager, version(s) 20.0.21, contain(s) an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Script injection.

AI-Powered Analysis

AILast updated: 07/05/2025, 17:11:39 UTC

Technical Analysis

CVE-2025-22479 is a vulnerability identified in Dell Storage Center - Dell Storage Manager, specifically version 20.0.21. The vulnerability is classified as CWE-22, which corresponds to an improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This type of vulnerability allows an attacker to manipulate file paths to access files and directories that are outside the intended restricted directory. In this case, an unauthenticated attacker with adjacent network access—that is, someone on the same local or logically adjacent network segment—could exploit this flaw. The exploitation could lead to script injection, which implies that the attacker might be able to inject malicious scripts into the system, potentially leading to further compromise or unauthorized actions. The CVSS v3.1 base score is 3.5, indicating a low severity level. The vector string (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) shows that the attack requires adjacent network access, low attack complexity, no privileges, and user interaction, with limited confidentiality impact and no impact on integrity or availability. No known exploits in the wild have been reported, and no patches are currently linked, suggesting that mitigation may rely on vendor updates or configuration changes once available. The vulnerability affects a storage management product widely used in enterprise environments for managing Dell storage arrays, which are critical infrastructure components in data centers and enterprise storage solutions.

Potential Impact

For European organizations, the impact of this vulnerability could be significant in environments where Dell Storage Center - Dell Storage Manager is deployed, particularly in data centers and enterprises relying on Dell storage solutions for critical data management. Although the CVSS score is low and the confidentiality impact is limited, the ability for an unauthenticated attacker on an adjacent network to perform script injection could serve as a foothold for further attacks or lateral movement within the network. This is particularly concerning in multi-tenant or segmented network environments where adjacent network access might be possible for less trusted users or compromised devices. The vulnerability could lead to unauthorized disclosure of sensitive information or manipulation of management scripts, potentially disrupting storage management operations or exposing sensitive configuration data. Given the critical role of storage management in data integrity and availability, even low-severity vulnerabilities warrant attention to prevent escalation or chaining with other vulnerabilities. European organizations with strict data protection regulations such as GDPR must consider the risk of unauthorized data access or leakage, even if limited, as it could lead to compliance issues and reputational damage.

Mitigation Recommendations

1. Network Segmentation: Restrict access to the Dell Storage Manager interface to trusted network segments only, ensuring that untrusted or guest networks cannot achieve adjacent network access. 2. Access Controls: Implement strict access control lists (ACLs) and firewall rules to limit which devices can communicate with the storage management system. 3. Monitoring and Logging: Enable detailed logging and monitor for unusual access patterns or script injection attempts on the storage manager. 4. Vendor Updates: Regularly check for and apply patches or updates from Dell addressing this vulnerability as soon as they become available. 5. User Interaction Minimization: Since user interaction is required for exploitation, educate administrators and users about suspicious prompts or unexpected script executions related to the storage manager. 6. Incident Response Preparedness: Develop and test incident response plans specifically for storage infrastructure compromise scenarios. 7. Configuration Review: Review and harden the configuration of Dell Storage Manager to disable any unnecessary scripting or remote management features that could be exploited. 8. Network Access Controls: Use network access control (NAC) solutions to ensure only authorized devices can connect to the network segments hosting the storage manager.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-01-07T06:04:12.135Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbda0f3

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 5:11:39 PM

Last updated: 7/26/2025, 2:40:44 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats