Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43995: CWE-287: Improper Authentication in Dell Dell Storage Manager

0
Critical
VulnerabilityCVE-2025-43995cvecve-2025-43995cwe-287
Published: Fri Oct 24 2025 (10/24/2025, 14:09:55 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Dell Storage Manager

Description

Dell Storage Center - Dell Storage Manager, version(s) 20.1.21, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Authentication Bypass in DSM Data Collector. An unauthenticated remote attacker can access APIs exposed by ApiProxy.war in DataCollectorEar.ear by using a special SessionKey and UserId. These userid are special users created in compellentservicesapi for special purposes.

AI-Powered Analysis

AILast updated: 10/31/2025, 15:45:16 UTC

Technical Analysis

CVE-2025-43995 is an improper authentication vulnerability (CWE-287) found in Dell Storage Manager (DSM) version 20.1.21. The flaw resides in the DSM Data Collector component, specifically in APIs exposed by ApiProxy.war within DataCollectorEar.ear. An unauthenticated remote attacker can exploit this vulnerability by leveraging specially crafted SessionKey and UserId values associated with special-purpose users created in the compellentservicesapi. These special users are intended for internal or system use, but the vulnerability allows bypassing normal authentication checks, effectively granting unauthorized access to DSM management functions. This can lead to a complete bypass of protection mechanisms, allowing attackers to manipulate storage configurations, access sensitive data, or disrupt storage services. The vulnerability is remotely exploitable over the network without any authentication or user interaction, which significantly increases its risk profile. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. No patches or exploit code are currently publicly available, but the vulnerability has been officially published and reserved since April 2025. Given the central role of DSM in managing Dell Storage Center environments, exploitation could have severe consequences for data security and operational continuity.

Potential Impact

For European organizations, this vulnerability poses a critical threat to the confidentiality, integrity, and availability of storage infrastructure managed by Dell Storage Manager. Successful exploitation could allow attackers to bypass authentication and gain unauthorized access to storage management APIs, potentially leading to data theft, unauthorized data modification, or disruption of storage services. This could impact sectors with high reliance on data integrity and availability such as finance, healthcare, government, and critical infrastructure. The ability to remotely exploit the vulnerability without authentication or user interaction increases the likelihood of attacks, especially in environments where DSM management interfaces are exposed or insufficiently segmented. The disruption or compromise of storage systems could lead to significant operational downtime, regulatory non-compliance (e.g., GDPR breaches), and reputational damage for affected organizations. Additionally, the lack of known exploits in the wild currently provides a window for proactive mitigation before active exploitation emerges.

Mitigation Recommendations

1. Immediately monitor Dell’s official channels for patches or security updates addressing CVE-2025-43995 and apply them as soon as they become available. 2. Restrict network access to Dell Storage Manager management interfaces by implementing strict firewall rules and network segmentation, ensuring only trusted administrative hosts can communicate with DSM components. 3. Disable or limit exposure of the ApiProxy.war and DataCollectorEar.ear components to untrusted networks. 4. Employ strong access controls and multi-factor authentication on management consoles and related infrastructure to reduce the risk of lateral movement if exploitation occurs. 5. Conduct regular security audits and vulnerability scans focused on storage management systems to detect unauthorized access attempts. 6. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous API calls or session key usage patterns. 7. Maintain comprehensive logging and monitoring of DSM API access to enable rapid detection and response to suspicious activities. 8. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving storage management compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-21T05:03:43.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fb956d3b281b3632d6adf8

Added to database: 10/24/2025, 3:04:13 PM

Last enriched: 10/31/2025, 3:45:16 PM

Last updated: 12/11/2025, 8:41:31 AM

Views: 244

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats