CVE-2025-24379

7.8 HIGH

📋 TL;DR

This OS command injection vulnerability in Dell Unity storage systems allows attackers with local access to execute arbitrary commands with elevated privileges. It affects Dell Unity, UnityVSA, and Unity XT versions 5.4 and earlier. Attackers could gain full control of affected systems.

💻 Affected Systems

Products:
  • Dell Unity
  • Dell UnityVSA
  • Dell Unity XT
Versions: 5.4 and prior versions
Operating Systems: Dell Unity OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires local access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands as root, exfiltrate data, deploy ransomware, or pivot to other systems.

🟠

Likely Case

Local privilege escalation leading to unauthorized administrative access, data theft, or system manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent local attacker access.

🌐 Internet-Facing: LOW - Requires local access, not remotely exploitable over internet.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with local access can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low privileged local access. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.5 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Download Dell Unity OS version 5.5 or later from Dell Support. 2. Apply the update through the Unity management interface. 3. Verify successful installation through system logs.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and logical access to Unity systems to authorized administrators only.

Network segmentation

all

Isolate Unity systems on separate network segments with strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls allowing only trusted administrators local access
  • Monitor system logs for unusual command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check Unity OS version via management interface: System > About. If version is 5.4 or earlier, system is vulnerable.

Check Version:

ssh admin@unity-system 'show version' or check via web interface System > About

Verify Fix Applied:

Verify Unity OS version is 5.5 or later in System > About. Check for successful update in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Privilege escalation attempts
  • Unauthorized user access to administrative functions

Network Indicators:

  • Unexpected outbound connections from Unity systems
  • Anomalous SSH or management interface activity

SIEM Query:

source="unity-logs" AND (event="command_execution" OR event="privilege_escalation")

🔗 References

📤 Share & Export