Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43995: CWE-287: Improper Authentication in Dell Dell Storage Manager

0
Critical
VulnerabilityCVE-2025-43995cvecve-2025-43995cwe-287
Published: Fri Oct 24 2025 (10/24/2025, 14:09:55 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Dell Storage Manager

Description

Dell Storage Center - Dell Storage Manager, version(s) 20.1.21, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Authentication Bypass in DSM Data Collector. An unauthenticated remote attacker can access APIs exposed by ApiProxy.war in DataCollectorEar.ear by using a special SessionKey and UserId. These userid are special users created in compellentservicesapi for special purposes.

AI-Powered Analysis

AILast updated: 10/24/2025, 15:04:30 UTC

Technical Analysis

CVE-2025-43995 is a critical security vulnerability classified under CWE-287 (Improper Authentication) affecting Dell Storage Manager (DSM) version 20.1.21. The flaw resides in the DSM Data Collector component, specifically within APIs exposed by the ApiProxy.war application packaged inside DataCollectorEar.ear. These APIs can be accessed remotely without authentication by leveraging special SessionKey and UserId credentials that correspond to special users created in the compellentservicesapi subsystem for internal or special purposes. This improper authentication allows an unauthenticated attacker with network access to bypass all protection mechanisms, effectively gaining unauthorized access to sensitive management functions. The vulnerability impacts confidentiality, integrity, and availability, enabling attackers to potentially manipulate storage configurations, exfiltrate sensitive data, or disrupt storage services. The CVSS v3.1 base score is 9.8 (critical), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been reported in the wild yet, the ease of exploitation and critical impact make this a high-priority issue. The vulnerability was publicly disclosed on October 24, 2025, with no patches currently available, emphasizing the need for immediate defensive measures. Dell Storage Manager is widely used in enterprise environments to manage storage arrays, making this vulnerability particularly dangerous for organizations relying on Dell storage infrastructure.

Potential Impact

For European organizations, the impact of CVE-2025-43995 is severe. Successful exploitation can lead to complete compromise of storage management systems, allowing attackers to access, modify, or delete critical data stored on Dell storage arrays. This could result in data breaches involving sensitive personal or corporate information, violating GDPR and other data protection regulations. The integrity of storage configurations could be undermined, potentially causing data corruption or loss. Availability of storage services may be disrupted, impacting business continuity and critical operations dependent on storage infrastructure. Given the central role of storage management in IT environments, attackers could also use this foothold to move laterally within networks, escalating privileges and compromising additional systems. The lack of authentication requirements and the remote attack vector increase the likelihood of exploitation, especially in organizations with exposed or poorly segmented management interfaces. This vulnerability poses a significant risk to sectors with stringent data protection needs such as finance, healthcare, government, and critical infrastructure across Europe.

Mitigation Recommendations

1. Immediately restrict network access to Dell Storage Manager management interfaces and APIs by implementing strict firewall rules and network segmentation to limit exposure only to trusted administrative hosts. 2. Monitor network traffic and logs for unusual API calls or access attempts to the ApiProxy.war endpoints, focusing on anomalous SessionKey and UserId usage patterns. 3. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting DSM components. 4. Coordinate with Dell for timely release and deployment of official patches or updates addressing this vulnerability. 5. Until patches are available, consider disabling or isolating the vulnerable DSM Data Collector components if operationally feasible. 6. Conduct thorough audits of storage management configurations and access controls to ensure no unauthorized changes have occurred. 7. Educate IT and security teams about the vulnerability and the importance of securing storage management interfaces. 8. Implement multi-factor authentication and enhanced logging for administrative access where supported to add layers of defense. 9. Regularly review and update incident response plans to include scenarios involving storage management compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-21T05:03:43.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fb956d3b281b3632d6adf8

Added to database: 10/24/2025, 3:04:13 PM

Last enriched: 10/24/2025, 3:04:30 PM

Last updated: 10/27/2025, 11:12:21 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats