CVE-2025-36592

5.4 MEDIUM

📋 TL;DR

Dell Secure Connect Gateway Policy Manager versions 5.20 through 5.28 contain a cross-site scripting (XSS) vulnerability that allows unauthenticated remote attackers to inject malicious scripts into web pages. This affects organizations using these specific versions of Dell SCG Policy Manager for managing secure connections.

💻 Affected Systems

Products:
  • Dell Secure Connect Gateway Policy Manager
Versions: 5.20, 5.22, 5.24, 5.26, 5.28
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments running affected versions are vulnerable by default. The vulnerability requires remote access but not authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially compromising the entire SCG management system.

🟠

Likely Case

Attackers would typically use this to steal session cookies or credentials from administrators, gaining unauthorized access to the SCG management interface.

🟢

If Mitigated

With proper web application firewalls and input validation controls, the impact is limited to failed exploitation attempts with no system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires the attacker to craft malicious input that gets reflected in web pages, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 5.30 or later as specified in Dell advisory

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000385220/dsa-2025-391-security-update-for-dell-secure-connect-gateway-policy-manager-for-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Download the latest version from Dell support portal. 2. Backup current configuration. 3. Apply the update following Dell's upgrade documentation. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious input patterns

Network Segmentation

all

Restrict access to SCG Policy Manager web interface to trusted networks only

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution
  • Deploy network-based intrusion prevention systems with XSS detection rules

🔍 How to Verify

Check if Vulnerable:

Check the SCG Policy Manager version via web interface or CLI. If version is 5.20, 5.22, 5.24, 5.26, or 5.28, the system is vulnerable.

Check Version:

Check web interface admin panel or use SCG CLI commands specific to your deployment

Verify Fix Applied:

After patching, verify the version is 5.30 or later and test the web interface for proper input sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with script tags or JavaScript payloads
  • Multiple failed login attempts following suspicious requests

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript code to SCG web endpoints
  • Unusual outbound connections from SCG server

SIEM Query:

source="scg_logs" AND (http_uri="*<script>*" OR http_body="*javascript:*" OR http_referer="*javascript:*")

🔗 References

📤 Share & Export