Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36593: CWE-294: Authentication Bypass by Capture-replay in Dell OpenManage Network Integration

0
High
VulnerabilityCVE-2025-36593cvecve-2025-36593cwe-294
Published: Mon Jun 30 2025 (06/30/2025, 18:29:05 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: OpenManage Network Integration

Description

Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:48:44 UTC

Technical Analysis

CVE-2025-36593 identifies an authentication bypass vulnerability in Dell OpenManage Network Integration versions prior to 3.8, caused by a capture-replay attack vector in the RADIUS protocol implementation. The vulnerability stems from improper validation of RADIUS authentication responses, allowing an attacker on the same local network segment to intercept and replay protocol accept messages. This replay attack tricks the system into granting access despite failed authentication attempts. The flaw is classified under CWE-294 (Authentication Bypass by Capture-replay), highlighting weaknesses in authentication mechanisms that do not adequately prevent replayed authentication tokens. The vulnerability requires no privileges or user interaction, and the attacker only needs local network access, which may be feasible in many enterprise environments. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow unauthorized control over network management functions, potentially leading to further network compromise or disruption. No patches or exploits are currently publicly available, but the vulnerability is officially published and should be addressed promptly.

Potential Impact

The impact of CVE-2025-36593 is significant for organizations relying on Dell OpenManage Network Integration for network device management. Successful exploitation allows attackers to bypass authentication controls and gain unauthorized access to network management interfaces, potentially leading to full control over network devices. This can result in data breaches, unauthorized configuration changes, network outages, and lateral movement within the network. The vulnerability compromises confidentiality by exposing sensitive management data, integrity by allowing unauthorized changes, and availability by enabling denial-of-service conditions through misconfigurations or device shutdowns. Given the local network access requirement, attackers could be internal threat actors or external adversaries who have breached perimeter defenses. The absence of known exploits in the wild provides a window for remediation, but the high CVSS score and ease of exploitation within local networks make this a critical risk for enterprises, data centers, and managed service providers using affected Dell products.

Mitigation Recommendations

To mitigate CVE-2025-36593, organizations should first verify their Dell OpenManage Network Integration version and upgrade to version 3.8 or later once available. In the absence of an immediate patch, network segmentation should be enforced to restrict access to RADIUS servers and management interfaces only to trusted hosts and administrators. Deploying network-level protections such as 802.1X port security, dynamic ARP inspection, and DHCP snooping can reduce the risk of local network attacks. Monitoring RADIUS traffic for anomalies and implementing strict logging can help detect replay attempts. Additionally, consider using stronger authentication protocols that include replay protection mechanisms, such as EAP-TLS, instead of relying solely on RADIUS with vulnerable configurations. Regularly auditing network device configurations and access controls will further reduce exposure. Finally, educating network administrators about this vulnerability and enforcing least privilege principles will help limit potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-15T21:31:17.348Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6862dd626f40f0eb728ca985

Added to database: 6/30/2025, 6:54:26 PM

Last enriched: 2/27/2026, 1:48:44 AM

Last updated: 3/25/2026, 5:44:12 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses