Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36589: CWE-611: Improper Restriction of XML External Entity Reference in Dell Unisphere for PowerMax

0
High
VulnerabilityCVE-2025-36589cvecve-2025-36589cwe-611
Published: Tue Jan 06 2026 (01/06/2026, 16:20:24 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Unisphere for PowerMax

Description

Dell Unisphere for PowerMax, version(s) 9.2.4.x, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access to data and resources outside of the intended sphere of control.

AI-Powered Analysis

AILast updated: 01/06/2026, 16:53:38 UTC

Technical Analysis

CVE-2025-36589 identifies an XML External Entity (XXE) vulnerability classified under CWE-611 in Dell Unisphere for PowerMax, specifically version 9.2.4.x. The vulnerability arises from improper restriction of XML external entity references during XML parsing, allowing attackers to craft malicious XML payloads that can cause the system to disclose sensitive files or internal resources. The attack vector is remote network access with low privileges, meaning an attacker does not need administrative rights but must have some authenticated or network-level access to the affected service. Exploitation can lead to unauthorized disclosure of confidential data, partial integrity compromise, and limited availability disruption. The CVSS v3.1 base score is 7.6, reflecting high severity due to the ease of exploitation (low attack complexity), network attack vector, and significant confidentiality impact. Although no public exploits or patches are currently available, the vulnerability poses a serious risk to organizations relying on Dell PowerMax storage management, which often handles critical enterprise data. The lack of user interaction requirement increases the threat level, as automated attacks are feasible. The vulnerability's presence in a core storage management platform means that successful exploitation could expose sensitive business data or disrupt storage operations, impacting business continuity and compliance.

Potential Impact

For European organizations, the impact of CVE-2025-36589 can be substantial. Dell PowerMax systems are widely used in large enterprises and data centers for high-performance storage management, often containing sensitive personal data, intellectual property, and critical business information. Unauthorized data access could lead to breaches of GDPR and other data protection regulations, resulting in legal penalties and reputational damage. The partial integrity loss could affect data reliability, leading to operational disruptions. Availability impacts, though limited, could affect storage management functions, potentially delaying critical IT operations. Given the remote exploitability and low privilege requirements, attackers could leverage this vulnerability to escalate access or move laterally within networks. European sectors such as finance, healthcare, manufacturing, and government, which rely heavily on robust storage solutions, are particularly at risk. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent attention to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-36589 effectively, European organizations should implement the following specific measures: 1) Immediately restrict network access to Dell Unisphere for PowerMax management interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted administrators only. 2) Monitor XML processing logs and network traffic for anomalous XML payloads indicative of XXE attacks. 3) Disable or restrict XML external entity processing in the application configuration if possible, or apply XML parser hardening techniques to prevent external entity resolution. 4) Enforce strict access controls and multi-factor authentication for all users accessing the management interface to reduce the risk of low-privilege attackers gaining access. 5) Maintain up-to-date backups of critical data and configuration to enable recovery in case of compromise. 6) Engage with Dell support to obtain patches or workarounds as soon as they become available and plan for rapid deployment. 7) Conduct security awareness training for administrators on recognizing and responding to suspicious activity related to storage management systems. These targeted actions go beyond generic advice by focusing on access control, monitoring, and XML parser configuration specific to the affected product.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-15T21:31:17.347Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d3ab2326bcb029a439109

Added to database: 1/6/2026, 4:39:14 PM

Last enriched: 1/6/2026, 4:53:38 PM

Last updated: 1/8/2026, 10:14:39 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats