Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46608: CWE-284: Improper Access Control in Dell Data Lakehouse

0
Critical
VulnerabilityCVE-2025-46608cvecve-2025-46608cwe-284
Published: Wed Nov 12 2025 (11/12/2025, 20:12:59 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Data Lakehouse

Description

Dell Data Lakehouse, versions prior to 1.6.0.0, contain(s) an Improper Access Control vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges. This vulnerability is considered Critical, as it may result in unauthorized access with elevated privileges, compromising system integrity and customer data. Dell recommends customers upgrade to the latest version at the earliest opportunity.

AI-Powered Analysis

AILast updated: 11/12/2025, 20:31:12 UTC

Technical Analysis

CVE-2025-46608 is an improper access control vulnerability classified under CWE-284 affecting Dell Data Lakehouse versions prior to 1.6.0.0. This vulnerability allows a high privileged attacker who already has remote access to the system to escalate their privileges further, potentially gaining unauthorized administrative control. The flaw arises from insufficient enforcement of access control policies within the Data Lakehouse platform, which manages large-scale data storage and analytics workloads. The vulnerability is critical due to its potential to compromise confidentiality, integrity, and availability of sensitive data and system components. The CVSS 3.1 base score of 9.1 reflects a network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability affects resources beyond the initially compromised component. Exploitation could allow attackers to manipulate data, disrupt services, or exfiltrate sensitive customer information. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make it a significant threat. Dell advises immediate upgrading to version 1.6.0.0 or later to remediate the issue. Organizations should also review their access control configurations and monitor for unusual privilege escalations.

Potential Impact

For European organizations, the impact of CVE-2025-46608 can be severe, especially for those relying on Dell Data Lakehouse for critical data analytics and storage. Successful exploitation could lead to unauthorized access to sensitive personal data, intellectual property, and operational data, violating GDPR and other data protection regulations. This could result in significant financial penalties, reputational damage, and operational disruptions. Critical sectors such as finance, healthcare, manufacturing, and government agencies that utilize data lake solutions for large-scale data processing are particularly vulnerable. The elevation of privileges could enable attackers to deploy ransomware, manipulate data analytics outcomes, or disrupt business continuity. Given the interconnected nature of European IT infrastructures, a compromised Data Lakehouse environment could also serve as a pivot point for lateral movement within networks, amplifying the threat. The lack of known exploits in the wild currently provides a window for proactive defense, but the high severity demands urgent attention.

Mitigation Recommendations

1. Upgrade Dell Data Lakehouse to version 1.6.0.0 or later immediately to apply the official patch addressing this vulnerability. 2. Implement strict network segmentation to limit remote access to Data Lakehouse management interfaces only to trusted administrative hosts. 3. Enforce the principle of least privilege rigorously, ensuring that high privileged accounts are minimized and monitored. 4. Deploy continuous monitoring and alerting for unusual privilege escalation activities or anomalous access patterns within the Data Lakehouse environment. 5. Conduct regular audits of access control policies and configurations to verify they align with security best practices. 6. Utilize multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. 7. Prepare incident response plans specifically addressing potential privilege escalation scenarios within data platforms. 8. Engage with Dell support and subscribe to security advisories for timely updates on this and related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-25T05:03:51.784Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914ed2507da5f027f521f74

Added to database: 11/12/2025, 8:25:09 PM

Last enriched: 11/12/2025, 8:31:12 PM

Last updated: 11/12/2025, 9:28:11 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats