CVE-2025-30105

8.8 HIGH

📋 TL;DR

Dell XtremIO version 6.4.0-22 logs sensitive information like credentials in log files. A low-privileged attacker with local access can read these logs to obtain credentials and potentially escalate privileges within the system. This affects Dell XtremIO X2 storage systems running the vulnerable software version.

💻 Affected Systems

Products:
  • Dell XtremIO X2
Versions: 6.4.0-22
Operating Systems: XtremIO proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the specific vulnerable version; requires local access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker obtains administrative credentials from logs, gains full control of the XtremIO system, and potentially accesses or manipulates stored data across connected systems.

🟠

Likely Case

Local users or compromised low-privilege accounts extract credentials from log files to gain elevated access within the XtremIO management interface.

🟢

If Mitigated

With proper log file permissions and monitoring, unauthorized access is detected before credential misuse occurs.

🌐 Internet-Facing: LOW - Exploitation requires local access to the system, not remote network access.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with local access can exploit this to escalate privileges significantly.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple file read operation once local access is obtained.

Exploitation requires an attacker to have some level of local access to read log files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patch per Dell advisory DSA-2025-108

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000337241/dsa-2025-108-security-update-for-dell-emc-xtremio-x2

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-108. 2. Download and apply the security update from Dell Support. 3. Restart the XtremIO system as required. 4. Verify the update is applied successfully.

🔧 Temporary Workarounds

Restrict log file permissions

linux

Set strict file permissions on log directories to prevent unauthorized read access by low-privilege users.

chmod 600 /path/to/xtremio/logs/*
chown root:root /path/to/xtremio/logs/*

Monitor log access

linux

Implement file integrity monitoring or audit logging to detect unauthorized access to log files.

auditctl -w /path/to/xtremio/logs -p r -k xtremio_log_access

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to XtremIO systems.
  • Regularly audit and rotate credentials that might be exposed in logs.

🔍 How to Verify

Check if Vulnerable:

Check the XtremIO software version via the management interface or CLI; if version is 6.4.0-22, it is vulnerable.

Check Version:

xtremio version (via XtremIO CLI or management interface)

Verify Fix Applied:

After patching, confirm the version is updated to a non-vulnerable release and test that sensitive data is no longer logged in plaintext.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file read attempts on log directories
  • Log entries containing plaintext credentials or sensitive data

Network Indicators:

  • Unusual authentication patterns from local IPs to XtremIO management interfaces

SIEM Query:

source="xtremio_logs" AND (event="file_access" AND file_path="/var/log/xtremio/*") OR (message="*password*" OR message="*credential*")

🔗 References

📤 Share & Export