CVE-2025-36598

6.5 MEDIUM

📋 TL;DR

Dell Avamar backup software versions before 19.12 with patch 338905 contain a path traversal vulnerability that allows authenticated high-privilege attackers to upload malicious files to restricted directories. This affects organizations using Dell Avamar for data backup and recovery. Attackers could potentially compromise backup integrity or gain further system access.

💻 Affected Systems

Products:
  • Dell Avamar
  • Dell Avamar Virtual Edition
Versions: All versions prior to 19.12 with patch 338905
Operating Systems: All supported Avamar platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high-privilege remote access; affects both physical and virtual editions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of backup infrastructure, data exfiltration, ransomware deployment across backup systems, and lateral movement to connected systems.

🟠

Likely Case

Unauthorized file upload leading to backup data corruption, malware persistence in backup systems, or privilege escalation within the Avamar environment.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires high-privilege credentials; path traversal vulnerabilities are typically straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.12 with patch 338905

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000347698/dsa-2025-271-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download patch 338905 from Dell Support. 2. Apply patch following Dell Avamar update procedures. 3. Restart Avamar services as required. 4. Verify successful installation.

🔧 Temporary Workarounds

Restrict Remote Access

all

Limit network access to Avamar management interfaces to trusted IP ranges only.

# Configure firewall rules to restrict access
# Example: iptables -A INPUT -p tcp --dport 28001 -s trusted_network -j ACCEPT
# Example: iptables -A INPUT -p tcp --dport 28001 -j DROP

Privilege Reduction

all

Review and reduce administrative privileges to minimum necessary levels.

# Review Avamar user permissions
# Remove unnecessary admin accounts
# Implement least privilege access

🧯 If You Can't Patch

  • Isolate Avamar systems from internet and untrusted networks using network segmentation.
  • Implement strict monitoring and alerting for file upload activities and path traversal attempts.

🔍 How to Verify

Check if Vulnerable:

Check Avamar version: Run 'avmgr version' or check Avamar Administrator interface. If version is below 19.12 without patch 338905, system is vulnerable.

Check Version:

avmgr version

Verify Fix Applied:

Verify patch installation: Check patch status in Avamar Administrator or run patch verification commands. Confirm version shows 19.12 with patch 338905 applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Path traversal strings in request logs
  • Unauthorized directory access attempts
  • Multiple failed upload attempts followed by success

Network Indicators:

  • Unusual traffic to Avamar management ports (typically 28001)
  • File uploads to non-standard paths
  • Requests containing '../' patterns

SIEM Query:

source="avamar_logs" AND ("../" OR "..\\" OR "path traversal" OR "directory traversal")

🔗 References

📤 Share & Export