Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43888: CWE-532: Insertion of Sensitive Information into Log File in Dell PowerProtect Data Manager

0
High
VulnerabilityCVE-2025-43888cvecve-2025-43888cwe-532
Published: Wed Sep 10 2025 (09/10/2025, 15:42:34 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, Hyper-V, version(s) 19.19 and 19.20, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:26:22 UTC

Technical Analysis

CVE-2025-43888 is a vulnerability identified in Dell PowerProtect Data Manager versions 19.19 and 19.20 operating within Hyper-V environments. The issue is classified under CWE-532, which pertains to the insertion of sensitive information into log files. Specifically, the software improperly logs sensitive data, potentially including credentials or other confidential information, which can be accessed by an attacker with low-level local privileges. This vulnerability does not require user interaction but does require the attacker to have local access to the system, albeit with limited privileges. The vulnerability’s CVSS 3.1 base score is 8.8, reflecting a high severity due to its impact on confidentiality, integrity, and availability, and the scope being changed (S:C), indicating that exploitation could affect resources beyond the initially vulnerable component. The vulnerability could allow an attacker to gain unauthorized access or escalate privileges by leveraging sensitive data exposed in logs. No public exploits are currently known, but the risk remains significant given the nature of the data managed by Dell PowerProtect Data Manager, which is often critical backup and recovery information. The lack of available patches at the time of publication necessitates immediate mitigation through access controls and monitoring. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure.

Potential Impact

The vulnerability could have severe consequences for organizations relying on Dell PowerProtect Data Manager for backup and data protection. Exposure of sensitive information in logs can lead to unauthorized access, privilege escalation, and potential compromise of backup data integrity and availability. Attackers with low privileges could leverage this information to move laterally within the network or escalate their access, threatening critical data assets. This could result in data breaches, loss of data confidentiality, disruption of backup and recovery operations, and increased risk of ransomware or other malicious activities targeting backup infrastructure. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, could face regulatory and compliance repercussions if exploited. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, emphasizing the critical nature of this vulnerability.

Mitigation Recommendations

1. Immediately restrict local access to systems running Dell PowerProtect Data Manager to trusted and authorized personnel only, minimizing the risk of exploitation by low-privileged users. 2. Implement strict file system permissions on log files to prevent unauthorized reading or tampering by non-privileged users. 3. Monitor and audit access to log files regularly to detect any suspicious activity or unauthorized access attempts. 4. Use encryption or secure logging mechanisms if supported by the product to protect sensitive information in logs. 5. Stay in close contact with Dell for official patches or updates addressing this vulnerability and apply them promptly once available. 6. Consider isolating backup management systems from general user environments to reduce the attack surface. 7. Employ endpoint detection and response (EDR) solutions to identify anomalous local activities indicative of exploitation attempts. 8. Review and harden Hyper-V host configurations to limit local access vectors and privilege escalation opportunities. 9. Educate administrators and users about the risks of local access and the importance of safeguarding sensitive log data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c19d54cce016a9a48210ce

Added to database: 9/10/2025, 3:46:28 PM

Last enriched: 2/27/2026, 2:26:22 AM

Last updated: 3/25/2026, 6:59:54 AM

Views: 234

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses