Skip to main content

CVE-2025-43886: CWE-35: Path Traversal: '.../...//' in Dell PowerProtect Data Manager

Medium
VulnerabilityCVE-2025-43886cvecve-2025-43886cwe-35
Published: Wed Sep 10 2025 (09/10/2025, 16:08:55 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) a Path Traversal: '.../...//' vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker.

AI-Powered Analysis

AILast updated: 09/10/2025, 16:12:26 UTC

Technical Analysis

CVE-2025-43886 is a path traversal vulnerability (CWE-35) identified in Dell PowerProtect Data Manager versions 19.19 and 19.20 running on Hyper-V environments. This vulnerability arises from improper sanitization of file path inputs, specifically involving the sequence '.../...//', which can be manipulated by a high-privileged local attacker to traverse directories beyond the intended scope. Exploiting this flaw allows the attacker to access arbitrary filesystem locations, potentially reading or manipulating files outside the application's designated directories. The vulnerability requires the attacker to have high-level privileges and local access to the affected system, and it does not require user interaction. The CVSS v3.1 base score is 4.4, indicating a medium severity primarily due to the limited attack vector (local access) and the lack of impact on confidentiality or integrity, but with a significant impact on availability. The vulnerability does not currently have known exploits in the wild, and no patches have been publicly linked yet. The issue is critical in environments where Dell PowerProtect Data Manager is used for backup and data management, as unauthorized filesystem access could disrupt backup operations or lead to denial of service conditions.

Potential Impact

For European organizations, this vulnerability poses a risk mainly to the availability of backup and data management services provided by Dell PowerProtect Data Manager. Since the attacker must have high privileges and local access, the threat is more relevant in scenarios where insider threats or compromised administrative accounts exist. Successful exploitation could lead to disruption of backup services, potentially causing data loss or delays in recovery processes, which is critical for compliance with data protection regulations such as GDPR. Although confidentiality and integrity impacts are not indicated, the availability impact could indirectly affect business continuity and regulatory compliance. Organizations relying heavily on Dell PowerProtect for critical data protection in sectors like finance, healthcare, and government could face operational disruptions. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

European organizations should implement strict access controls to limit local administrative privileges to trusted personnel only, reducing the risk of exploitation by insiders. Monitoring and auditing of privileged user activities on systems running Dell PowerProtect Data Manager should be enhanced to detect any suspicious behavior indicative of exploitation attempts. Until official patches are released, organizations can consider deploying application-level controls such as input validation or sandboxing to restrict file system access paths. Network segmentation and host-based firewalls can limit local access to critical backup servers. Additionally, organizations should maintain regular backups and test recovery procedures to mitigate potential availability impacts. Engaging with Dell support for early access to patches or workarounds and subscribing to vulnerability advisories will ensure timely updates. Finally, implementing endpoint detection and response (EDR) solutions can help identify and respond to exploitation attempts promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c1a33d65b18cd0836584b5

Added to database: 9/10/2025, 4:11:41 PM

Last enriched: 9/10/2025, 4:12:26 PM

Last updated: 9/10/2025, 7:52:51 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats