Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-45378: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell CloudLink

0
Critical
VulnerabilityCVE-2025-45378cvecve-2025-45378cwe-78
Published: Wed Nov 05 2025 (11/05/2025, 16:23:15 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: CloudLink

Description

Dell CloudLink, versions 8.0 through 8.1.2, contain vulnerability on restricted shell. A Privileged user with known password can break into command shell of CloudLink server and gain access of shell and escalate privilege, gain unauthorized access of system. If ssh is enabled with web credentials of server, attack is possible through network with known privileged user/password.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:28:27 UTC

Technical Analysis

CVE-2025-45378 is an OS command injection vulnerability classified under CWE-78 affecting Dell CloudLink versions 8.0 through 8.1.2. The vulnerability arises from improper neutralization of special elements in a restricted shell environment, allowing a privileged user with valid credentials to escape the restricted shell and execute arbitrary OS commands on the CloudLink server. This leads to privilege escalation and unauthorized access to the underlying system. The attack vector requires SSH to be enabled and the attacker to have knowledge of privileged user credentials, which can be obtained through credential compromise or insider threat. The vulnerability has a CVSS 3.1 base score of 9.1, reflecting its critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and scope change. The impact includes full compromise of confidentiality, integrity, and availability of the affected system. Although no known exploits are publicly reported, the vulnerability's nature and severity make it a high-risk target for attackers aiming to gain persistent and elevated access within enterprise environments. Dell CloudLink is used for secure cloud connectivity and management, making this vulnerability particularly dangerous in environments relying on it for secure communications and infrastructure management.

Potential Impact

The impact of CVE-2025-45378 is severe for organizations using affected Dell CloudLink versions. Exploitation allows attackers with privileged credentials to bypass security controls, gain full shell access, and escalate privileges on CloudLink servers. This can lead to unauthorized access to sensitive data, disruption of cloud connectivity services, and potential lateral movement within the network. The compromise of CloudLink servers may also undermine the security of connected cloud environments, exposing critical infrastructure and business operations to further attacks. Given the network-exploitable nature and high privileges required, attackers who obtain credentials can fully control affected systems, causing significant confidentiality breaches, data integrity loss, and service outages. This vulnerability poses a critical risk to enterprises, especially those relying on Dell CloudLink for secure cloud management and connectivity.

Mitigation Recommendations

To mitigate CVE-2025-45378, organizations should immediately verify if they are running affected Dell CloudLink versions (8.0 through 8.1.2) and prioritize upgrading to patched versions once available. Until patches are released, restrict SSH access to CloudLink servers by implementing strict network segmentation and firewall rules limiting SSH connections to trusted management hosts only. Enforce strong privileged credential management, including multi-factor authentication (MFA) for all privileged accounts, and regularly rotate passwords to reduce the risk of credential compromise. Monitor and audit SSH login attempts and shell access on CloudLink servers for suspicious activity. Disable SSH access if not required or consider using alternative secure management methods. Additionally, implement intrusion detection systems (IDS) to detect anomalous command execution patterns indicative of shell escapes or privilege escalation attempts. Finally, educate administrators on the risks of credential exposure and enforce the principle of least privilege to minimize the impact of any compromised accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-22T05:03:45.359Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b7c74ffac907e5be8d8ff

Added to database: 11/5/2025, 4:33:56 PM

Last enriched: 2/27/2026, 2:28:27 AM

Last updated: 3/24/2026, 8:21:17 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses