CVE-2025-43995

9.8 CRITICAL

📋 TL;DR

CVE-2025-43995 is an authentication bypass vulnerability in Dell Storage Manager that allows unauthenticated remote attackers to access protected APIs using special session keys and user IDs. This affects Dell Storage Center systems running Dell Storage Manager version 20.1.21, potentially exposing sensitive storage management functions.

💻 Affected Systems

Products:
  • Dell Storage Center - Dell Storage Manager
Versions: 20.1.21
Operating Systems: Not specified - likely appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: Affects DataCollectorEar.ear component with ApiProxy.war exposed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of storage infrastructure, data exfiltration, ransomware deployment, or destruction of storage systems.

🟠

Likely Case

Unauthorized access to storage management functions, configuration changes, data access, and potential privilege escalation.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have additional authentication layers.

🌐 Internet-Facing: HIGH - Directly exploitable over network without authentication.
🏢 Internal Only: HIGH - Even internal attackers can exploit without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack uses known special SessionKey and UserId values to bypass authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version specified in DSA-2025-393

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000382899/dsa-2025-393-security-update-for-storage-center-dell-storage-manager-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-393. 2. Download and apply the security update from Dell Support. 3. Restart affected Dell Storage Manager services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Dell Storage Manager management interfaces

Use firewall rules to limit access to trusted IP addresses only

API Proxy Restriction

all

Block or restrict access to ApiProxy.war endpoints

Configure web server/application firewall to block /ApiProxy/* paths

🧯 If You Can't Patch

  • Isolate Dell Storage Manager systems from untrusted networks
  • Implement network segmentation and strict access controls

🔍 How to Verify

Check if Vulnerable:

Check Dell Storage Manager version via web interface or CLI. If version is 20.1.21, system is vulnerable.

Check Version:

Check via Dell Storage Manager web interface or consult Dell documentation for version check commands.

Verify Fix Applied:

Verify version has been updated beyond 20.1.21 and test authentication requirements for API endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API access attempts
  • Access using special SessionKey/UserId values
  • Unusual API calls to DataCollectorEar endpoints

Network Indicators:

  • HTTP requests to /ApiProxy/* without authentication headers
  • Traffic to Dell Storage Manager ports from unexpected sources

SIEM Query:

source="dell-storage-manager" AND (event_type="api_access" AND auth_status="failed") OR (uri_path="/ApiProxy/*" AND user_agent!="normal-client")

🔗 References

📤 Share & Export