CVE-2025-23377
📋 TL;DR
This vulnerability allows a high-privileged attacker with local access to inject malicious web scripts or HTML into Dell PowerProtect Data Manager Reporting outputs. It affects versions 19.17 and 19.18 of the software. The impact is limited to users who can access the reporting interface locally.
💻 Affected Systems
- Dell PowerProtect Data Manager Reporting
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated high-privilege attacker could inject malicious scripts that execute in other users' browsers when viewing reports, potentially leading to session hijacking, credential theft, or further system compromise.
Likely Case
Malicious script injection in reports that could manipulate displayed data or create misleading information for administrators viewing the reports.
If Mitigated
If proper access controls and input validation are in place, the impact is limited to data integrity issues within the reporting interface.
🎯 Exploit Status
Requires high privileges and local access, making exploitation more difficult than remote vulnerabilities.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to version beyond 19.18 as specified in Dell advisory
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities
Restart Required: Yes
Instructions:
1. Review Dell advisory DSA-2025-062. 2. Download the appropriate patch from Dell Support. 3. Apply the patch following Dell's installation instructions. 4. Restart the PowerProtect Data Manager service.
🔧 Temporary Workarounds
Restrict Local Access
allLimit local access to the PowerProtect Data Manager system to only necessary administrative personnel.
Implement Principle of Least Privilege
allReview and reduce the number of users with high privileges on the system.
🧯 If You Can't Patch
- Implement strict access controls to limit who can access the reporting interface locally
- Monitor for unusual activity in reporting outputs and audit logs for suspicious access patterns
🔍 How to Verify
Check if Vulnerable:
Check the PowerProtect Data Manager version via the web interface or CLI. If version is 19.17 or 19.18, the system is vulnerable.
Check Version:
Check via PowerProtect Data Manager web interface under System Information or use appliance-specific CLI commands
Verify Fix Applied:
Verify the version has been updated to a patched version beyond 19.18 as specified in Dell's advisory.
📡 Detection & Monitoring
Log Indicators:
- Unusual report generation activity
- Multiple failed login attempts followed by report access
- Reports with unexpected content or formatting
Network Indicators:
- Unusual traffic patterns to reporting endpoints from internal sources
SIEM Query:
source="powerprotect" AND (event_type="report_generation" OR event_type="report_access") AND user_privilege="high"