Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43725: CWE-276: Incorrect Default Permissions in Dell PowerProtect Data Manager

0
High
VulnerabilityCVE-2025-43725cvecve-2025-43725cwe-276
Published: Wed Sep 10 2025 (09/10/2025, 15:56:08 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, Generic Application Agent, version(s) 19.19 and 19.20, contain(s) an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.

AI-Powered Analysis

AILast updated: 09/18/2025, 00:42:39 UTC

Technical Analysis

CVE-2025-43725 is a high-severity vulnerability identified in Dell PowerProtect Data Manager, specifically affecting the Generic Application Agent component in versions 19.19 and 19.20. The vulnerability is classified under CWE-276, which pertains to Incorrect Default Permissions. This means that certain files, directories, or resources within the application are configured with overly permissive default access rights. Consequently, a low-privileged attacker who has local access to the affected system could exploit these misconfigurations to execute arbitrary code. The CVSS v3.1 base score of 7.8 reflects a high impact, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require user interaction, which increases its risk profile once local access is obtained. Although no known exploits are reported in the wild yet, the potential for code execution makes this a critical concern for organizations relying on Dell PowerProtect Data Manager for data protection and backup management. The lack of available patches at the time of disclosure necessitates immediate attention to mitigate risk.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those using Dell PowerProtect Data Manager in their data backup and recovery infrastructure. Exploitation could lead to unauthorized code execution, potentially allowing attackers to manipulate backup data, disrupt data recovery processes, or gain further footholds within the network. This could compromise data confidentiality, integrity, and availability, leading to data loss, service outages, or ransomware attacks leveraging backup systems. Given the critical role of backup solutions in business continuity, exploitation could severely affect operational resilience. Additionally, organizations subject to strict data protection regulations such as GDPR could face compliance risks and reputational damage if backups are compromised. The requirement for local access limits remote exploitation but does not eliminate risk, as insider threats or attackers who have already gained initial access could leverage this vulnerability to escalate privileges or move laterally within networks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately audit and review permissions on Dell PowerProtect Data Manager installations to identify and correct any overly permissive default settings, ensuring the principle of least privilege is enforced. 2) Restrict local access to systems running the affected versions by enforcing strict access controls, including multi-factor authentication for administrative access and limiting physical and remote console access. 3) Monitor system logs and behavior for unusual activities indicative of privilege escalation or code execution attempts within the backup environment. 4) Engage with Dell support or security advisories regularly to obtain patches or updates as soon as they become available and apply them promptly. 5) Implement network segmentation to isolate backup infrastructure from general user environments, reducing the risk of local access exploitation. 6) Conduct regular security awareness training to minimize insider threats and ensure staff understand the importance of safeguarding access credentials and physical access to critical systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-17T05:03:55.667Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c1a1c551d6d0ab833ae27e

Added to database: 9/10/2025, 4:05:25 PM

Last enriched: 9/18/2025, 12:42:39 AM

Last updated: 10/29/2025, 9:36:58 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats