Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36564: CWE-61: UNIX Symbolic Link (Symlink) Following in Dell Encryption Admin Utilities

0
High
VulnerabilityCVE-2025-36564cvecve-2025-36564cwe-61
Published: Tue Jun 03 2025 (06/03/2025, 14:41:03 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Encryption Admin Utilities

Description

Dell Encryption Admin Utilities versions prior to 11.10.2 contain an Improper Link Resolution vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:27:55 UTC

Technical Analysis

CVE-2025-36564 is a vulnerability identified in Dell Encryption Admin Utilities versions prior to 11.10.2, involving improper symbolic link resolution (CWE-61). This flaw arises when the software fails to securely handle symbolic links, allowing a local attacker to create or manipulate symlinks that the utility follows incorrectly. By exploiting this, an attacker with local access and limited privileges can escalate their privileges, gaining higher-level access to the system. The vulnerability affects the confidentiality, integrity, and availability of systems by potentially allowing unauthorized access to sensitive encrypted data or administrative functions. The CVSS 3.1 base score of 7.8 indicates a high-severity issue with low attack complexity (AC:L), requiring local privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component or system. No public exploits are known yet, but the nature of the vulnerability suggests it could be leveraged in targeted attacks against organizations relying on Dell Encryption Admin Utilities for data protection. The vulnerability underscores the risks of improper link resolution in UNIX-like environments, where symlink attacks can lead to privilege escalation if software does not validate or sanitize link targets properly.

Potential Impact

The primary impact of CVE-2025-36564 is local privilege escalation, enabling attackers with limited access to gain administrative or root-level privileges on affected systems. This can lead to unauthorized access to encrypted data managed by Dell Encryption Admin Utilities, undermining data confidentiality. Additionally, attackers could modify or disrupt encryption configurations, affecting data integrity and availability. Organizations relying on these utilities for endpoint encryption management face increased risk of data breaches, insider threats, and potential lateral movement within networks. The vulnerability could facilitate further attacks, including installation of persistent malware or disabling of security controls. Given the critical role of encryption in protecting sensitive information, exploitation could have severe consequences for compliance, data privacy, and operational continuity.

Mitigation Recommendations

Until Dell releases an official patch, organizations should implement strict local access controls to limit the number of users with local system access, especially on machines running Dell Encryption Admin Utilities. Employ file system monitoring tools to detect unusual symlink creation or modification activities. Use mandatory access control (MAC) frameworks like SELinux or AppArmor to restrict the utility’s ability to follow or resolve symlinks outside expected directories. Conduct regular audits of user permissions and remove unnecessary local accounts. Isolate critical systems to reduce the risk of local attacker presence. Once available, promptly apply Dell’s security updates for Encryption Admin Utilities to remediate the vulnerability. Additionally, educate system administrators about the risks of symlink attacks and encourage secure coding practices for handling symbolic links in custom scripts or tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-15T21:29:33.583Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff340

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 2/26/2026, 9:27:55 PM

Last updated: 3/25/2026, 7:30:08 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses