CVE-2025-36572
📋 TL;DR
Dell PowerStore version 4.0.0.0 contains hard-coded credentials in its image file, allowing attackers with knowledge of these credentials to gain unauthorized access. This affects organizations using vulnerable PowerStore storage systems, potentially compromising storage infrastructure and data.
💻 Affected Systems
- Dell PowerStore
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of PowerStore system leading to data theft, destruction, or ransomware deployment across connected storage infrastructure.
Likely Case
Unauthorized access to PowerStore management interface allowing configuration changes, data access, or service disruption.
If Mitigated
Limited impact if network segmentation and access controls prevent remote exploitation attempts.
🎯 Exploit Status
Exploitation requires knowledge of hard-coded credentials and network access to PowerStore management interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to version specified in DSA-2025-223
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000325205/dsa-2025-223-dell-powerstore-t-security-update-for-multiple-vulnerabilities
Restart Required: Yes
Instructions:
1. Review Dell advisory DSA-2025-223. 2. Download appropriate PowerStore update. 3. Apply update following Dell's documented procedures. 4. Verify successful update and system functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to PowerStore management interfaces to trusted administrative networks only.
Access Control Lists
allImplement strict firewall rules and ACLs to limit which IP addresses can connect to PowerStore management ports.
🧯 If You Can't Patch
- Isolate PowerStore systems from untrusted networks and internet access
- Implement multi-factor authentication and monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check PowerStore version via management interface or CLI. If version is 4.0.0.0, system is vulnerable.
Check Version:
Check via PowerStore Manager UI or use PowerStore CLI commands specific to your deployment
Verify Fix Applied:
Verify PowerStore version has been updated to a version beyond 4.0.0.0 as specified in Dell's advisory.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts with hard-coded credentials
- Unusual login patterns to PowerStore management interface
- Configuration changes from unexpected sources
Network Indicators:
- Unusual traffic to PowerStore management ports (typically 443)
- Connection attempts from unauthorized IP addresses
SIEM Query:
source="powerstore" AND (event_type="authentication" AND result="failure") OR (event_type="configuration_change" AND user!="authorized_admin")