CVE-2025-43885

7.8 HIGH

📋 TL;DR

This vulnerability allows local low-privileged attackers to execute arbitrary operating system commands on Dell PowerProtect Data Manager Hyper-V systems through OS command injection. It affects Dell PowerProtect Data Manager versions 19.19 and 19.20 running Hyper-V environments. Attackers could potentially gain elevated privileges or compromise the entire system.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Manager
Versions: 19.19 and 19.20
Operating Systems: Windows Server with Hyper-V role
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Hyper-V components within PowerProtect Data Manager. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/administrator access, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to backup data, system configuration modification, and potential credential harvesting.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal local user accounts, and strict access controls preventing exploitation.

🌐 Internet-Facing: LOW - Requires local access to the vulnerable system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any local user with low privileges could potentially exploit this vulnerability to gain elevated access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access with low privileges. Command injection vulnerabilities typically have straightforward exploitation paths once the injection point is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates as specified in DSA-2025-326

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000367456/dsa-2025-326-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review DSA-2025-326 advisory. 2. Download appropriate patches from Dell Support. 3. Apply patches following Dell's installation instructions. 4. Restart affected services/systems as required.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local user accounts to only essential administrative personnel

Network Segmentation

all

Isolate PowerProtect Data Manager systems from general user networks

🧯 If You Can't Patch

  • Implement strict access controls allowing only trusted administrators local access
  • Monitor system logs for unusual command execution patterns and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check PowerProtect Data Manager version via web interface or command line. If version is 19.19 or 19.20, system is vulnerable.

Check Version:

Check via PowerProtect Data Manager web interface or consult Dell documentation for version query commands.

Verify Fix Applied:

Verify version has been updated beyond 19.20 or check patch installation status in Dell PowerProtect Data Manager interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Privilege escalation attempts
  • Unexpected process creation from PowerProtect services

Network Indicators:

  • Unusual outbound connections from PowerProtect system
  • Unexpected SSH/RDP connections originating from the system

SIEM Query:

source="PowerProtect" AND (event_type="command_execution" OR process_name="cmd.exe" OR process_name="powershell.exe") AND user!="authorized_admin"

🔗 References

📤 Share & Export