Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36597: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Dell Avamar Server

0
Medium
VulnerabilityCVE-2025-36597cvecve-2025-36597cwe-22
Published: Tue Feb 17 2026 (02/17/2026, 19:05:24 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Avamar Server

Description

Dell Avamar, versions prior to 19.12 with patch 338905, contains an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Security. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to information disclosure.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:22:33 UTC

Technical Analysis

CVE-2025-36597 is a path traversal vulnerability identified in Dell Avamar Server versions 19.8 through 19.12 prior to patch 338905. The flaw stems from improper validation and limitation of pathname inputs, allowing an attacker with high privileges and remote access to traverse directories outside the intended restricted paths. This can lead to unauthorized access to sensitive files, potentially exposing confidential information or enabling further system manipulation. The vulnerability does not require user interaction but does require the attacker to have elevated privileges on the system, which limits the attack surface to insiders or attackers who have already compromised lower-level accounts. The CVSS v3.1 score is 4.7 (medium), reflecting the moderate impact on confidentiality, integrity, and availability, and the requirement for high privileges. No public exploits have been reported, but the vulnerability poses a risk to organizations relying on Dell Avamar for backup and data protection, as unauthorized file access could undermine data integrity and confidentiality. The vulnerability is classified under CWE-22, indicating improper pathname limitation to restricted directories, a common issue leading to path traversal attacks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Dell Avamar Server for backup and disaster recovery operations. Unauthorized access to backup files or system files could lead to exposure of sensitive corporate data, intellectual property, or personal data protected under GDPR. This could result in regulatory penalties, reputational damage, and operational disruptions. Additionally, attackers exploiting this vulnerability could manipulate backup data, affecting data integrity and recovery reliability. The requirement for high privileges limits exploitation to insiders or attackers who have already gained elevated access, but this does not diminish the risk in environments with multiple administrators or where privilege escalation is possible. The medium severity rating suggests that while the vulnerability is not critical, it still warrants timely remediation to prevent potential data breaches and maintain compliance with European data protection standards.

Mitigation Recommendations

European organizations should immediately verify their Dell Avamar Server versions and apply patch 338905 or later to remediate this vulnerability. If patching is not immediately possible, restrict remote access to Avamar management interfaces to trusted networks and enforce strict access controls and monitoring for privileged accounts. Implement network segmentation to isolate backup servers and use multi-factor authentication for administrative access to reduce the risk of privilege abuse. Regularly audit file access logs and monitor for unusual directory traversal attempts or unauthorized file access. Additionally, conduct internal security training to minimize the risk of privilege misuse by insiders. Employ endpoint detection and response (EDR) solutions to detect suspicious activities related to file system access on backup servers. Finally, maintain an up-to-date inventory of affected systems and ensure compliance with data protection regulations by securing backup data confidentiality and integrity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-15T21:32:11.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699575bb80d747be2053771d

Added to database: 2/18/2026, 8:18:03 AM

Last enriched: 2/18/2026, 8:22:33 AM

Last updated: 2/20/2026, 9:19:40 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats