CVE-2025-43887

7.0 HIGH

📋 TL;DR

Dell PowerProtect Data Manager versions 19.19 and 19.20 on Hyper-V have incorrect default permissions that allow local low-privileged attackers to elevate their privileges. This affects organizations using these specific versions for Hyper-V backup management. Attackers need local access to the system to exploit this vulnerability.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Manager
Versions: 19.19 and 19.20
Operating Systems: Windows Server with Hyper-V role
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Hyper-V deployments; other deployment types are not vulnerable. Requires local access to the PowerProtect Data Manager system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the PowerProtect Data Manager system, potentially compromising all backup data, modifying backup configurations, or using the system as a pivot point to attack other infrastructure.

🟠

Likely Case

A malicious insider or compromised low-privileged account escalates to administrator privileges, allowing them to access sensitive backup data, disrupt backup operations, or install persistent malware.

🟢

If Mitigated

With proper network segmentation, strict access controls, and monitoring, the impact is limited to the specific Hyper-V backup management system without lateral movement to other infrastructure.

🌐 Internet-Facing: LOW - This vulnerability requires local access to exploit, making internet-facing systems less vulnerable unless attackers have already breached perimeter defenses.
🏢 Internal Only: HIGH - Internal attackers with local access (including compromised accounts) can exploit this to gain administrative privileges on critical backup infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but appears straightforward based on the CWE-276 (Incorrect Default Permissions) classification. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 19.21 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000367456/dsa-2025-326-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the latest PowerProtect Data Manager update from Dell Support. 2. Backup current configuration. 3. Apply the update following Dell's documented procedures. 4. Restart the PowerProtect Data Manager services. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local access to PowerProtect Data Manager systems to only authorized administrators

# Use Windows Group Policy or local security policies to restrict interactive logon rights
# Remove non-essential users from local administrators group

Enhanced Monitoring

windows

Implement strict monitoring of privilege escalation attempts and unauthorized access

# Enable detailed Windows security auditing
# Monitor Event IDs 4672 (Special privileges assigned), 4688 (Process creation)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerProtect Data Manager systems from general user networks
  • Enforce principle of least privilege and regularly audit local user permissions on affected systems

🔍 How to Verify

Check if Vulnerable:

Check PowerProtect Data Manager version in the web interface under Settings > About, or run 'Get-PPDMVersion' PowerShell command if available.

Check Version:

Check web interface at https://<ppdm-server>/settings/about or use vendor-specific CLI tools

Verify Fix Applied:

Verify version is 19.21 or higher and check that default permissions have been corrected in Hyper-V integration components.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized access to PowerProtect administrative functions
  • Changes to Hyper-V backup permissions

Network Indicators:

  • Unusual authentication patterns to PowerProtect management interfaces
  • Lateral movement from user workstations to backup systems

SIEM Query:

source="windows_security" EventID=4672 OR EventID=4688 | where process_name contains "PowerProtect" OR command_line contains "privilege"

🔗 References

📤 Share & Export