Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43938: CWE-256: Plaintext Storage of a Password in Dell PowerProtect Data Manager

0
Medium
VulnerabilityCVE-2025-43938cvecve-2025-43938cwe-256
Published: Wed Sep 10 2025 (09/10/2025, 16:03:38 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, version(s) 19.19 and 19.20, Hyper-V contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to gain unauthorized access with privileges of the compromised account.

AI-Powered Analysis

AILast updated: 09/10/2025, 16:06:45 UTC

Technical Analysis

CVE-2025-43938 is a vulnerability identified in Dell PowerProtect Data Manager versions 19.19 and 19.20 running on Hyper-V environments. The issue is classified under CWE-256, which pertains to the plaintext storage of passwords. Specifically, this vulnerability allows a high-privileged attacker with local access to the affected system to retrieve user credentials stored in plaintext. Since the credentials are not encrypted or hashed securely, an attacker who gains access to these stored passwords can disclose them and potentially use them to escalate privileges or move laterally within the network. The vulnerability requires the attacker to already have high privileges and local access, which limits remote exploitation but still poses a significant risk if an attacker compromises an account or gains physical or administrative access to the host. The CVSS 3.1 base score is 5.0 (medium severity), reflecting the requirement for high privileges and user interaction, but the impact on confidentiality is high due to credential disclosure. The vulnerability does not affect integrity or availability directly. No known exploits are currently reported in the wild, and no patches or mitigation links were provided at the time of publication. The scope is considered changed (S:C) because the vulnerability affects resources beyond the initially compromised component, potentially impacting other systems if credentials are reused or allow lateral movement.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to critical backup and data management systems if an attacker gains local high-privileged access. PowerProtect Data Manager is used for enterprise backup and recovery, so exposure of credentials could compromise backup integrity indirectly by allowing attackers to access or manipulate backup data, potentially leading to data breaches or loss of data availability through sabotage. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risk of regulatory penalties if credential disclosure leads to data breaches. The requirement for local high privileges somewhat limits the attack surface but does not eliminate risk, especially in environments where insider threats or compromised administrative accounts are possible. Additionally, the use of Hyper-V environments is common in European enterprises, increasing the relevance of this vulnerability. The medium severity rating suggests that while immediate remote exploitation is unlikely, the vulnerability can be leveraged as part of a multi-stage attack chain to escalate privileges or move laterally within networks.

Mitigation Recommendations

1. Immediately audit and restrict local administrative access to systems running Dell PowerProtect Data Manager, ensuring only trusted personnel have high privileges. 2. Implement strict access controls and monitoring on Hyper-V hosts to detect and prevent unauthorized local access. 3. Rotate and change all credentials stored or used by PowerProtect Data Manager, especially if local access has been suspected or confirmed. 4. Employ endpoint detection and response (EDR) solutions to monitor for suspicious activities indicative of credential harvesting or privilege escalation. 5. Use encryption or secure vault solutions for password storage where possible, and advocate for Dell to release patches or updates that eliminate plaintext password storage. 6. Regularly review and apply security updates from Dell once available, and subscribe to vendor advisories for timely patching. 7. Conduct internal penetration testing and vulnerability assessments focusing on local privilege escalation vectors to identify and remediate similar risks. 8. Enforce multi-factor authentication (MFA) for administrative accounts to reduce the impact of credential disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-20T05:04:01.415Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c1a1c551d6d0ab833ae284

Added to database: 9/10/2025, 4:05:25 PM

Last enriched: 9/10/2025, 4:06:45 PM

Last updated: 10/30/2025, 2:13:26 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats