CVE-2025-38745

4.8 MEDIUM

📋 TL;DR

Dell OpenManage Enterprise versions 3.10 through 4.2 contain a vulnerability where sensitive information is written to log files during backup and restore operations. This allows low-privileged remote attackers to potentially access confidential data. Organizations using these specific versions of Dell's management software are affected.

💻 Affected Systems

Products:
  • Dell OpenManage Enterprise
Versions: 3.10, 4.0, 4.1, 4.2
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects backup and restore functionality. Requires low-privileged remote access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive credentials, configuration data, or other confidential information stored in logs, potentially enabling further system compromise or data theft.

🟠

Likely Case

Low-privileged users or attackers who gain initial access can read sensitive information from log files, exposing credentials or configuration details that shouldn't be accessible.

🟢

If Mitigated

With proper access controls and log file permissions, the exposed information remains inaccessible to unauthorized users, limiting the impact.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low-privileged remote access to the system. Exploitation involves accessing log files containing sensitive backup/restore information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.3 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000356351/dsa-2025-314-security-update-for-dell-openmanage-enterprise-vulnerability

Restart Required: No

Instructions:

1. Download the latest OpenManage Enterprise version from Dell Support. 2. Backup current configuration. 3. Install the update following Dell's upgrade documentation. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Log File Access

Linux

Set strict file permissions on OpenManage Enterprise log directories to prevent low-privileged users from reading log files.

chmod 640 /var/log/openmanage/*
chown root:root /var/log/openmanage/*

Disable Backup/Restore for Non-Admins

all

Remove backup and restore permissions from low-privileged user accounts in OpenManage Enterprise.

🧯 If You Can't Patch

  • Implement strict access controls on log directories to prevent unauthorized reading
  • Monitor log file access attempts and audit user permissions regularly

🔍 How to Verify

Check if Vulnerable:

Check OpenManage Enterprise version in web interface or via command: omreport system version

Check Version:

omreport system version

Verify Fix Applied:

Verify version is 4.3 or later and check that sensitive information no longer appears in backup/restore logs

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to log files
  • Sensitive data patterns in backup/restore logs

Network Indicators:

  • Unusual file access patterns to log directories from non-admin accounts

SIEM Query:

source="openmanage" AND (event="File Access" OR event="Log Read") AND user!="admin" AND filepath="*log*"

🔗 References

📤 Share & Export