Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43887: CWE-276: Incorrect Default Permissions in Dell PowerProtect Data Manager

0
High
VulnerabilityCVE-2025-43887cvecve-2025-43887cwe-276
Published: Wed Sep 10 2025 (09/10/2025, 15:59:56 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

AI-Powered Analysis

AILast updated: 09/18/2025, 00:42:59 UTC

Technical Analysis

CVE-2025-43887 is a high-severity vulnerability identified in Dell PowerProtect Data Manager versions 19.19 and 19.20, specifically when deployed on Hyper-V environments. The vulnerability is categorized under CWE-276, which relates to Incorrect Default Permissions. This flaw allows a low-privileged attacker with local access to the affected system to exploit improperly configured default permissions, potentially leading to an elevation of privileges. The vulnerability arises because certain files, directories, or resources within the PowerProtect Data Manager installation are assigned permissions that are too permissive by default. This misconfiguration enables an attacker to manipulate or replace critical files or configurations, thereby escalating their privileges beyond their initial access level. The CVSS v3.1 base score of 7.0 reflects a high severity, with the vector indicating that the attack requires local access (AV:L), high attack complexity (AC:H), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk, especially in environments where local access controls are weak or where multiple users share access to the system. The absence of available patches at the time of publication suggests that organizations must rely on interim mitigations until official fixes are released. Given that Dell PowerProtect Data Manager is a data protection and backup solution widely used in enterprise environments, exploitation could compromise backup integrity, confidentiality of sensitive data, and availability of critical recovery services.

Potential Impact

For European organizations, the impact of CVE-2025-43887 could be substantial. PowerProtect Data Manager is often deployed in data centers and enterprise IT environments to manage backups and disaster recovery. An attacker exploiting this vulnerability could gain elevated privileges, potentially allowing unauthorized access to backup data, modification or deletion of backup sets, or disruption of backup operations. This could lead to data breaches involving sensitive personal or corporate data, violating GDPR requirements and resulting in regulatory penalties. Additionally, the integrity and availability of backup data could be compromised, undermining business continuity and disaster recovery plans. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, are particularly at risk. The requirement for local access limits remote exploitation but does not eliminate risk in environments where insider threats exist or where attackers can gain initial footholds through other means. The high impact on confidentiality, integrity, and availability underscores the critical nature of this vulnerability for European enterprises relying on Dell PowerProtect Data Manager.

Mitigation Recommendations

To mitigate CVE-2025-43887 effectively, European organizations should take several specific actions beyond generic security hygiene: 1) Immediately audit and review file system permissions for Dell PowerProtect Data Manager installations, focusing on files and directories that should have restricted access. Adjust permissions to follow the principle of least privilege, ensuring only necessary system accounts and administrators have write or modify rights. 2) Restrict local access to systems running PowerProtect Data Manager by enforcing strict access controls, including the use of multi-factor authentication for administrative accounts and limiting user accounts with local login rights. 3) Monitor system logs and file integrity for unauthorized changes to critical files related to the PowerProtect Data Manager to detect potential exploitation attempts early. 4) Segment backup infrastructure networks to isolate backup management systems from general user networks, reducing the risk of lateral movement by attackers with local access. 5) Engage with Dell support channels to obtain and apply patches or updates as soon as they become available, and subscribe to Dell security advisories for timely information. 6) Implement endpoint detection and response (EDR) solutions capable of detecting privilege escalation behaviors on affected hosts. 7) Conduct regular security awareness training emphasizing the risks of local access and insider threats to reduce the likelihood of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c1a1c551d6d0ab833ae281

Added to database: 9/10/2025, 4:05:25 PM

Last enriched: 9/18/2025, 12:42:59 AM

Last updated: 10/29/2025, 9:36:55 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats