CVE-2025-24377

7.8 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privileged attacker with local access can execute arbitrary commands, potentially gaining code execution and privilege escalation. Affected systems include Dell Unity, UnityVSA, and Unity XT versions 5.4 and earlier.

💻 Affected Systems

Products:
  • Dell Unity
  • Dell UnityVSA
  • Dell Unity XT
Versions: 5.4 and prior
Operating Systems: Dell Unity OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, data exfiltration, ransomware deployment, and lateral movement to other systems.

🟠

Likely Case

Local privilege escalation from low-privileged user to root/admin, enabling persistence, data access, and further system manipulation.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: LOW (requires local access, not remotely exploitable)
🏢 Internal Only: HIGH (local attackers can exploit to gain full system control)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and low-privileged credentials. No public exploit available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.5 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Download the latest firmware from Dell Support. 2. Apply the update through the Unity management interface. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and logical access to Unity systems to only authorized administrators.

Implement Least Privilege

all

Remove unnecessary local user accounts and ensure remaining accounts have minimal required privileges.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Unity systems from other critical infrastructure.
  • Enable detailed logging and monitoring for suspicious command execution attempts.

🔍 How to Verify

Check if Vulnerable:

Check system version via Unity management interface: System > About. If version is 5.4 or earlier, system is vulnerable.

Check Version:

Check via Unity CLI: 'uemcli -u admin -p <password> /sys/general show'

Verify Fix Applied:

After patching, verify system version shows 5.5 or later in System > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Privilege escalation attempts
  • Suspicious user activity from low-privileged accounts

Network Indicators:

  • Unexpected outbound connections from Unity systems
  • Anomalous traffic patterns

SIEM Query:

source="unity_logs" AND (event_type="command_execution" OR user_privilege_change="escalation")

🔗 References

📤 Share & Export