Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43995: CWE-287: Improper Authentication in Dell Dell Storage Manager

0
Critical
VulnerabilityCVE-2025-43995cvecve-2025-43995cwe-287
Published: Fri Oct 24 2025 (10/24/2025, 14:09:55 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Dell Storage Manager

Description

Dell Storage Center - Dell Storage Manager, version(s) 20.1.21, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Authentication Bypass in DSM Data Collector. An unauthenticated remote attacker can access APIs exposed by ApiProxy.war in DataCollectorEar.ear by using a special SessionKey and UserId. These userid are special users created in compellentservicesapi for special purposes.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:32:50 UTC

Technical Analysis

CVE-2025-43995 is an improper authentication vulnerability classified under CWE-287 affecting Dell Storage Manager (DSM) version 20.1.21. The vulnerability resides in the DSM Data Collector component, specifically in APIs exposed by ApiProxy.war within the DataCollectorEar.ear package. These APIs can be accessed remotely without authentication by leveraging special SessionKey and UserId parameters associated with privileged internal users created in the compellentservicesapi module for special purposes. This authentication bypass allows an unauthenticated attacker to circumvent protection mechanisms, gaining unauthorized access to sensitive management functions. The flaw does not require any user interaction or prior authentication, making it highly exploitable remotely over the network. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing attackers to manipulate storage management operations, extract sensitive data, or disrupt storage services. The CVSS v3.1 score is 9.8 (critical), reflecting the ease of exploitation and the severe impact on affected systems. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to organizations relying on Dell Storage Manager for their storage infrastructure. The lack of available patches at the time of disclosure necessitates immediate compensating controls to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2025-43995 is substantial due to the critical role Dell Storage Manager plays in managing enterprise storage arrays and data centers. Successful exploitation could lead to unauthorized access to storage management APIs, enabling attackers to manipulate storage configurations, extract sensitive data, or cause denial of service by disrupting storage operations. This could compromise data confidentiality, integrity, and availability, affecting business continuity and regulatory compliance, especially under GDPR requirements. Organizations with remote access to DSM management interfaces are particularly vulnerable. The attack could also facilitate lateral movement within networks, escalating the threat to broader IT infrastructure. Critical sectors such as finance, healthcare, telecommunications, and government agencies in Europe that depend on Dell storage solutions may face operational disruptions and data breaches, leading to financial losses and reputational damage.

Mitigation Recommendations

1. Immediately restrict network access to the DSM Data Collector APIs by implementing strict firewall rules and network segmentation to limit exposure only to trusted management networks. 2. Monitor network traffic and DSM logs for unusual API access patterns, especially calls involving the special SessionKey and UserId parameters. 3. Disable or restrict remote access to the ApiProxy.war endpoints until a vendor patch is available. 4. Engage with Dell support to obtain any available patches or workarounds and apply them promptly once released. 5. Enforce multi-factor authentication and strong access controls on all management interfaces to reduce risk from compromised credentials. 6. Conduct a thorough audit of DSM user accounts and API keys to identify and revoke any unnecessary or suspicious credentials. 7. Prepare incident response plans specific to storage management compromise scenarios. 8. Keep all related infrastructure components updated and hardened according to best practices. 9. Consider deploying intrusion detection/prevention systems tuned to detect exploitation attempts targeting DSM APIs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-21T05:03:43.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fb956d3b281b3632d6adf8

Added to database: 10/24/2025, 3:04:13 PM

Last enriched: 1/7/2026, 7:32:50 PM

Last updated: 2/7/2026, 5:33:22 PM

Views: 289

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats