Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43887: CWE-276: Incorrect Default Permissions in Dell PowerProtect Data Manager

0
High
VulnerabilityCVE-2025-43887cvecve-2025-43887cwe-276
Published: Wed Sep 10 2025 (09/10/2025, 15:59:56 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:26:07 UTC

Technical Analysis

CVE-2025-43887 identifies an incorrect default permissions vulnerability (CWE-276) in Dell PowerProtect Data Manager versions 19.19 and 19.20 running on Hyper-V environments. The flaw arises from improperly configured file or resource permissions that allow users with low privileges on the local system to escalate their privileges without requiring user interaction. This vulnerability is significant because it undermines the principle of least privilege, enabling attackers to gain elevated rights that can compromise the confidentiality, integrity, and availability of the backup and data management infrastructure. The CVSS v3.1 score of 7.0 reflects a high severity, with attack vector limited to local access, high attack complexity, and requiring low privileges but no user interaction. The vulnerability affects critical enterprise backup software that manages data protection workflows, making it a valuable target for attackers seeking to disrupt or manipulate backup data or gain persistent footholds. Although no exploits are currently known in the wild, the presence of this vulnerability in widely used enterprise backup solutions necessitates urgent attention. The lack of published patches at the time of disclosure means organizations must implement interim controls to mitigate risk. The vulnerability was reserved in April 2025 and published in September 2025, indicating a recent discovery and disclosure timeline.

Potential Impact

The impact of CVE-2025-43887 is substantial for organizations relying on Dell PowerProtect Data Manager in Hyper-V environments. Successful exploitation allows a low-privileged local attacker to escalate privileges, potentially gaining administrative control over the backup management system. This can lead to unauthorized access to sensitive backup data, manipulation or deletion of backups, disruption of data recovery processes, and potential lateral movement within the network. Compromise of backup infrastructure undermines an organization's ability to recover from ransomware or other cyberattacks, increasing operational risk and potential data loss. The high severity score reflects the broad impact on confidentiality, integrity, and availability. Enterprises with large-scale deployments of Dell PowerProtect, especially in sectors like finance, healthcare, government, and critical infrastructure, face increased risk of targeted attacks leveraging this vulnerability. The requirement for local access limits remote exploitation but does not eliminate risk, as insider threats or attackers who have gained initial footholds can leverage this flaw to escalate privileges further.

Mitigation Recommendations

Until official patches are released by Dell, organizations should implement specific mitigations to reduce risk from CVE-2025-43887: 1) Restrict local access to systems running Dell PowerProtect Data Manager, ensuring only trusted administrators have login capabilities. 2) Audit and manually correct file and resource permissions related to the PowerProtect installation to enforce least privilege principles. 3) Employ host-based intrusion detection and monitoring to detect unusual privilege escalation attempts or unauthorized access patterns. 4) Isolate backup management servers within segmented network zones with strict access controls to limit lateral movement. 5) Regularly review and tighten Hyper-V host security configurations to prevent unauthorized local access. 6) Prepare for rapid deployment of official patches once available by maintaining up-to-date asset inventories and patch management processes. 7) Educate administrators and security teams about the vulnerability and signs of exploitation to improve detection and response capabilities. These targeted actions go beyond generic advice by focusing on access control, permission auditing, and monitoring specific to the affected product and environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c1a1c551d6d0ab833ae281

Added to database: 9/10/2025, 4:05:25 PM

Last enriched: 2/27/2026, 2:26:07 AM

Last updated: 3/25/2026, 4:23:44 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses