Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43886: CWE-35: Path Traversal: '.../...//' in Dell PowerProtect Data Manager

0
Medium
VulnerabilityCVE-2025-43886cvecve-2025-43886cwe-35
Published: Wed Sep 10 2025 (09/10/2025, 16:08:55 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) a Path Traversal: '.../...//' vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker.

AI-Powered Analysis

AILast updated: 09/18/2025, 00:46:33 UTC

Technical Analysis

CVE-2025-43886 is a path traversal vulnerability identified in Dell PowerProtect Data Manager versions 19.19 and 19.20, specifically affecting the Hyper-V deployment. The vulnerability is categorized under CWE-35, which involves improper neutralization of special elements used in a path, allowing an attacker to manipulate file paths to access unauthorized filesystem locations. In this case, the vulnerability arises from the handling of the path sequence '.../...//', which can be exploited by a high-privileged attacker with local access to traverse directories beyond the intended scope. Exploiting this flaw could enable the attacker to access or potentially manipulate files outside the designated directories, leading to unauthorized filesystem access. The CVSS v3.1 base score is 4.4, indicating a medium severity level. The vector string (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) shows that the attack requires local access (AV:L), low attack complexity (AC:L), and high privileges (PR:H), with no user interaction (UI:N). The impact affects availability (A:H) but does not compromise confidentiality or integrity directly. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on vendor updates or configuration changes once available. This vulnerability is significant because PowerProtect Data Manager is a critical backup and data protection solution used in enterprise environments, and unauthorized filesystem access could disrupt backup operations or lead to data loss or denial of service.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those relying on Dell PowerProtect Data Manager for critical backup and disaster recovery operations. Unauthorized filesystem access by a high-privileged local attacker could lead to disruption of backup services, potential data loss, or denial of service conditions affecting data availability. This could impair business continuity and compliance with data protection regulations such as GDPR, which mandates stringent controls on data integrity and availability. Organizations in sectors with high data sensitivity—such as finance, healthcare, and government—may face increased operational risks and regulatory scrutiny if backups are compromised or unavailable. Additionally, since the vulnerability requires local high privilege access, insider threats or compromised administrative accounts pose a significant risk vector. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict and monitor local administrative access to systems running Dell PowerProtect Data Manager, ensuring that only trusted personnel have high privilege accounts. 2) Employ strict access controls and auditing on backup servers to detect any unauthorized access attempts or suspicious filesystem activity. 3) Apply principle of least privilege to limit the scope of local accounts, reducing the risk of exploitation by insiders or compromised accounts. 4) Monitor Dell’s security advisories closely for patches or updates addressing CVE-2025-43886 and prioritize timely deployment once available. 5) Consider deploying host-based intrusion detection systems (HIDS) to identify anomalous file access patterns indicative of path traversal exploitation attempts. 6) Conduct regular security training for administrators to raise awareness about the risks of privilege misuse and the importance of secure credential management. 7) If possible, isolate backup management systems in segmented network zones to limit lateral movement in case of compromise. These targeted actions go beyond generic advice by focusing on controlling local high-privilege access and monitoring filesystem integrity specific to the affected product environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c1a33d65b18cd0836584b5

Added to database: 9/10/2025, 4:11:41 PM

Last enriched: 9/18/2025, 12:46:33 AM

Last updated: 10/29/2025, 9:36:41 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats