Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46425: CWE-611: Improper Restriction of XML External Entity Reference in Dell Dell Storage Manager

0
Medium
VulnerabilityCVE-2025-46425cvecve-2025-46425cwe-611
Published: Fri Oct 24 2025 (10/24/2025, 14:04:03 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Dell Storage Manager

Description

Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:13:35 UTC

Technical Analysis

CVE-2025-46425 identifies a vulnerability classified under CWE-611, which pertains to improper restriction of XML External Entity (XXE) references in Dell Storage Manager version 20.1.20. XXE vulnerabilities arise when XML parsers process external entities without adequate validation, allowing attackers to read arbitrary files, perform server-side request forgery (SSRF), or cause denial of service. In this case, a low-privileged attacker with remote network access can exploit the vulnerability without requiring user interaction. The flaw stems from insufficient validation or restriction of XML external entity references within the Dell Storage Manager application, which is used for managing Dell Storage Center arrays. Successful exploitation could lead to unauthorized access to sensitive data, potentially exposing configuration files or credentials stored on the system. The CVSS 3.1 base score of 6.5 reflects a medium severity, with a vector indicating network attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability highlights the importance of secure XML parsing configurations and input validation in storage management software.

Potential Impact

The primary impact of CVE-2025-46425 is unauthorized disclosure of sensitive information due to exploitation of the XXE vulnerability. Organizations using Dell Storage Manager could have confidential configuration data, credentials, or other sensitive files exposed to attackers with network access and low privileges. This could facilitate further attacks such as lateral movement, privilege escalation, or data exfiltration. While the vulnerability does not directly affect data integrity or system availability, the confidentiality breach alone can have severe consequences, especially in environments managing critical storage infrastructure. The medium severity score indicates a significant risk that requires timely remediation. Enterprises relying on Dell Storage Manager for storage array management, particularly those in sectors with strict data protection requirements (e.g., finance, healthcare, government), face elevated risks. Additionally, exposure of internal storage management details could aid attackers in crafting more sophisticated attacks against storage infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-46425, organizations should implement the following specific measures: 1) Apply vendor patches or updates for Dell Storage Manager as soon as they become available to address the XXE vulnerability directly. 2) If patches are not yet available, disable or restrict XML external entity processing in the application configuration or underlying XML parsers where possible. 3) Employ network segmentation and access controls to limit remote access to Dell Storage Manager interfaces only to trusted administrators and management networks. 4) Monitor logs and network traffic for unusual XML payloads or access patterns indicative of XXE exploitation attempts. 5) Conduct regular security assessments and code reviews focusing on XML input handling and parser configurations. 6) Educate administrators on the risks of XXE and the importance of secure configuration management. 7) Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with signatures tuned to detect XXE attack patterns targeting storage management systems. These targeted mitigations go beyond generic advice by focusing on XML parser hardening, access restriction, and proactive monitoring specific to the Dell Storage Manager environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-24T05:03:44.662Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fb8a56b0116405c29b03ab

Added to database: 10/24/2025, 2:16:54 PM

Last enriched: 2/27/2026, 5:13:35 AM

Last updated: 3/26/2026, 8:20:09 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses