CVE-2025-23377

4.2 MEDIUM

📋 TL;DR

This vulnerability allows a high-privileged attacker with local access to inject malicious web scripts or HTML into Dell PowerProtect Data Manager Reporting outputs. It affects versions 19.17 and 19.18 of the software. The impact is limited to users who can access the reporting interface locally.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Manager Reporting
Versions: 19.17, 19.18
Operating Systems: Not specified - likely appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high privileged attacker with local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated high-privilege attacker could inject malicious scripts that execute in other users' browsers when viewing reports, potentially leading to session hijacking, credential theft, or further system compromise.

🟠

Likely Case

Malicious script injection in reports that could manipulate displayed data or create misleading information for administrators viewing the reports.

🟢

If Mitigated

If proper access controls and input validation are in place, the impact is limited to data integrity issues within the reporting interface.

🌐 Internet-Facing: LOW - The vulnerability requires local access and high privileges, making internet-facing exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal attackers with high privileges could exploit this, but the impact is limited to the reporting interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires high privileges and local access, making exploitation more difficult than remote vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version beyond 19.18 as specified in Dell advisory

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-062. 2. Download the appropriate patch from Dell Support. 3. Apply the patch following Dell's installation instructions. 4. Restart the PowerProtect Data Manager service.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to the PowerProtect Data Manager system to only necessary administrative personnel.

Implement Principle of Least Privilege

all

Review and reduce the number of users with high privileges on the system.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the reporting interface locally
  • Monitor for unusual activity in reporting outputs and audit logs for suspicious access patterns

🔍 How to Verify

Check if Vulnerable:

Check the PowerProtect Data Manager version via the web interface or CLI. If version is 19.17 or 19.18, the system is vulnerable.

Check Version:

Check via PowerProtect Data Manager web interface under System Information or use appliance-specific CLI commands

Verify Fix Applied:

Verify the version has been updated to a patched version beyond 19.18 as specified in Dell's advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual report generation activity
  • Multiple failed login attempts followed by report access
  • Reports with unexpected content or formatting

Network Indicators:

  • Unusual traffic patterns to reporting endpoints from internal sources

SIEM Query:

source="powerprotect" AND (event_type="report_generation" OR event_type="report_access") AND user_privilege="high"

🔗 References

📤 Share & Export