CVE-2025-36611

7.3 HIGH

📋 TL;DR

This vulnerability allows a local malicious user to exploit improper link resolution in Dell Encryption and Dell Security Management Server, potentially leading to privilege escalation. It affects versions prior to 11.11.0. Attackers must have local access to the system to exploit this flaw.

💻 Affected Systems

Products:
  • Dell Encryption
  • Dell Security Management Server
Versions: All versions prior to 11.11.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Dell Encryption client software and the Security Management Server component. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative privileges on the system, potentially compromising the entire Dell security management infrastructure and encrypted data.

🟠

Likely Case

Local authenticated users escalate privileges to gain unauthorized access to sensitive system resources or administrative functions.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and prevented before privilege escalation occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Internal malicious users or compromised accounts can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some technical knowledge of link following/symlink attacks. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.11.0

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000347824/dsa-2025-292

Restart Required: Yes

Instructions:

1. Download Dell Encryption/Security Management Server version 11.11.0 or later from Dell support site. 2. Backup current configuration. 3. Install the update following Dell's installation guide. 4. Restart affected systems.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Limit local user accounts to only necessary privileges to reduce attack surface

Implement strict access controls

windows

Use Windows Group Policy to restrict access to Dell Encryption directories and executables

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all local user accounts
  • Monitor for suspicious file access patterns and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Dell Encryption or Security Management Server version in Control Panel > Programs and Features

Check Version:

wmic product where "name like 'Dell Encryption%'" get version

Verify Fix Applied:

Verify version is 11.11.0 or later in Control Panel > Programs and Features

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Windows Event Logs
  • Multiple failed privilege escalation attempts
  • Access to sensitive Dell Encryption directories by non-admin users

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%dellencryption%' OR ProcessName LIKE '%dellsms%') AND NewProcessName LIKE '%powershell%' OR NewProcessName LIKE '%cmd%'

🔗 References

📤 Share & Export