CVE-2025-36589

7.6 HIGH

📋 TL;DR

This XXE vulnerability in Dell Unisphere for PowerMax allows low-privileged remote attackers to access unauthorized data and resources by exploiting improper XML parsing. It affects Dell Unisphere for PowerMax version 9.2.4.x. Attackers could potentially read sensitive files or interact with internal systems.

💻 Affected Systems

Products:
  • Dell Unisphere for PowerMax
Versions: 9.2.4.x
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Virtual appliance versions are also affected according to the advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including sensitive data exfiltration, credential theft, and lateral movement to other systems in the environment.

🟠

Likely Case

Unauthorized access to configuration files, credentials, or other sensitive data stored on the PowerMax management system.

🟢

If Mitigated

Limited impact with proper network segmentation and XML parsing restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged remote access. XXE vulnerabilities are well-understood with established exploitation patterns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 9.2.4.x (check Dell advisory for specific fixed version)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000402262/dsa-2025-425-dell-powermaxos-dell-powermax-eem-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-unisphere-360-dell-solutions-enabler-virtual-appliance-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-425. 2. Download and apply the security update from Dell Support. 3. Restart the Unisphere service or appliance. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable XXE Processing

all

Configure XML parsers to disable external entity processing

Configuration varies by XML parser - consult Dell documentation for Unisphere-specific settings

Network Segmentation

all

Restrict access to Unisphere management interface

firewall rules to limit source IPs
implement VLAN segmentation

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Unisphere interface
  • Deploy a web application firewall with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check Unisphere version via web interface or CLI. If version is 9.2.4.x, system is vulnerable.

Check Version:

Check via Unisphere web interface or consult Dell documentation for CLI commands

Verify Fix Applied:

Verify version is updated beyond 9.2.4.x and test XML parsing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • External entity resolution attempts in logs
  • Unexpected file access patterns

Network Indicators:

  • XML payloads with external entity references
  • Outbound connections from Unisphere to unexpected internal systems

SIEM Query:

source="unisphere" AND ("XXE" OR "external entity" OR "DOCTYPE")

🔗 References

📤 Share & Export