Skip to main content

CVE-2025-23379: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dell Dell Storage Center - Dell Storage Manager

Low
VulnerabilityCVE-2025-23379cvecve-2025-23379cwe-79
Published: Tue May 06 2025 (05/06/2025, 15:25:06 UTC)
Source: CVE
Vendor/Project: Dell
Product: Dell Storage Center - Dell Storage Manager

Description

Dell Storage Center - Dell Storage Manager, version(s) 21.0.20, contain(s) an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Script injection.

AI-Powered Analysis

AILast updated: 07/05/2025, 17:56:39 UTC

Technical Analysis

CVE-2025-23379 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting Dell Storage Center - Dell Storage Manager, specifically version 21.0.20. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious script injection. An unauthenticated attacker with adjacent network access—meaning they must be on the same or a closely connected network segment—can exploit this flaw. The attack vector requires user interaction, such as a victim clicking a crafted link or visiting a malicious page served by the attacker. Successful exploitation results in the injection and execution of attacker-controlled scripts within the context of the vulnerable web application. Although the CVSS score is relatively low at 3.5, reflecting limited confidentiality impact and no integrity or availability impact, the vulnerability can still be leveraged for session hijacking, phishing, or delivering further attacks within the local network. The absence of known exploits in the wild suggests this is a newly disclosed issue. The vulnerability does not require authentication, increasing its risk profile in environments where adjacent network access is feasible. Dell Storage Manager is a management interface for Dell Storage Center arrays, used to configure and monitor storage infrastructure, making it a critical component in enterprise storage environments.

Potential Impact

For European organizations, the impact of this vulnerability depends on the deployment of Dell Storage Center - Dell Storage Manager within their infrastructure. Organizations relying on this product for storage management could face risks of targeted XSS attacks from malicious insiders or compromised devices within the same network segment. While the vulnerability does not directly compromise data confidentiality or system integrity, it could facilitate social engineering attacks or session hijacking that might lead to unauthorized access to the management interface. This could indirectly affect the availability and security of storage resources. Given the critical role of storage management in data centers and enterprise IT, even low-severity vulnerabilities can have operational consequences if exploited in combination with other weaknesses. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential for indirect data exposure or unauthorized access resulting from such attacks. The requirement for adjacent network access limits remote exploitation but does not eliminate risk in complex network environments where segmentation may be insufficient.

Mitigation Recommendations

1. Immediate application of any available patches or updates from Dell once released is the primary mitigation step. Since no patch links are currently provided, organizations should monitor Dell's security advisories closely. 2. Implement strict network segmentation to restrict access to the Dell Storage Manager interface, ensuring only authorized management stations within secure network zones can reach it. 3. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the management interface. 4. Enforce multi-factor authentication (MFA) on the management interface to reduce the risk of session hijacking or unauthorized access resulting from XSS exploitation. 5. Conduct regular security awareness training for administrators to recognize phishing or suspicious links that could trigger XSS attacks. 6. Monitor logs and network traffic for unusual activity around the storage management interface, especially from adjacent network segments. 7. Review and harden input validation and output encoding configurations if customizable within the Dell Storage Manager environment, to reduce XSS risk. 8. Consider deploying endpoint protection and network intrusion detection systems to identify lateral movement attempts that could precede exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-01-15T06:04:03.642Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda442

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 5:56:39 PM

Last updated: 8/11/2025, 6:45:28 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats