Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23375: CWE-648: Incorrect Use of Privileged APIs in Dell PowerProtect Data Manager

0
High
VulnerabilityCVE-2025-23375cvecve-2025-23375cwe-648
Published: Mon Apr 28 2025 (04/28/2025, 14:28:03 UTC)
Source: CVE
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:56:35 UTC

Technical Analysis

CVE-2025-23375 is a vulnerability identified in Dell PowerProtect Data Manager, specifically version 19.15.0, categorized under CWE-648, which relates to the incorrect use of privileged APIs. This flaw allows a low-privileged attacker who has local access to the system to exploit the improper handling of privileged API calls, resulting in an elevation of privileges. The vulnerability does not require user interaction, and the attacker only needs low-level privileges and local access to trigger the exploit. The CVSS v3.1 base score is 7.8, indicating a high severity level, with impacts rated as high on confidentiality, integrity, and availability. The vulnerability could allow attackers to gain unauthorized administrative control over the PowerProtect Data Manager environment, potentially compromising backup data integrity, confidentiality, and availability. Although no public exploits have been reported yet, the risk is significant due to the critical role of PowerProtect Data Manager in enterprise data protection and disaster recovery. The vulnerability was reserved in January 2025 and published in April 2025, with no patch links currently available, suggesting that remediation may still be pending or in progress. Organizations relying on this product should be aware of the risk and prepare to apply patches or mitigations once released.

Potential Impact

The impact of CVE-2025-23375 is substantial for organizations using Dell PowerProtect Data Manager, as it enables local attackers with low privileges to escalate their rights to administrative levels. This can lead to unauthorized access to sensitive backup data, manipulation or deletion of backup sets, disruption of backup and recovery operations, and potential data loss or leakage. The compromise of backup infrastructure can severely affect business continuity and disaster recovery capabilities, increasing downtime and recovery costs. Given the high confidentiality, integrity, and availability impacts, organizations may face regulatory compliance issues, reputational damage, and financial losses. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments where multiple users have local system access or where attackers can gain foothold through other means. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-23375, organizations should implement strict local access controls and limit the number of users with local system access to Dell PowerProtect Data Manager servers. Employing the principle of least privilege for all users and service accounts can reduce the attack surface. Monitoring and auditing local user activities on these systems can help detect suspicious privilege escalation attempts. Organizations should stay informed about Dell’s security advisories and apply patches or updates promptly once they become available. In the interim, consider isolating PowerProtect Data Manager servers within secure network segments and using host-based intrusion detection systems to identify anomalous behavior. Additionally, reviewing and hardening API usage policies and configurations within the product may help mitigate exploitation risks. Regular backups of critical configurations and data, stored securely and separately, will aid recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-01-15T06:04:03.641Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee3d1

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 2/26/2026, 8:56:35 PM

Last updated: 3/24/2026, 10:14:23 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses