CVE-2025-45378

9.1 CRITICAL

📋 TL;DR

Dell CloudLink versions 8.0 through 8.1.2 have a vulnerability where privileged users with known passwords can escape the restricted shell, gaining full command shell access and escalating privileges. This affects organizations using Dell CloudLink within the vulnerable version range. Attackers can exploit this via SSH if enabled with web credentials.

💻 Affected Systems

Products:
  • Dell CloudLink
Versions: 8.0 through 8.1.2
Operating Systems: Not specified, likely Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SSH to be enabled with web credentials; exploitation depends on privileged user credentials being known or compromised.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, access sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Privilege escalation leading to unauthorized access of the CloudLink server, potential data exfiltration, and system manipulation.

🟢

If Mitigated

Limited impact if strong access controls, network segmentation, and monitoring are in place to detect unauthorized shell access attempts.

🌐 Internet-Facing: HIGH if SSH is enabled and exposed to the internet, as attackers can exploit remotely with known credentials.
🏢 Internal Only: HIGH due to potential insider threats or compromised internal accounts exploiting the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with privileged credentials; CVSS 9.1 indicates high severity and ease of exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version beyond 8.1.2 as per vendor advisory

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000384363/dsa-2025-374-security-update-for-dell-cloudlink-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review the Dell advisory. 2. Backup configurations. 3. Apply the latest patch from Dell. 4. Restart the CloudLink server. 5. Verify the update.

🔧 Temporary Workarounds

Disable SSH Access

linux

Disable SSH on the CloudLink server if not required to prevent remote exploitation.

systemctl stop sshd
systemctl disable sshd

Restrict Network Access

linux

Use firewall rules to limit SSH access to trusted IP addresses only.

iptables -A INPUT -p tcp --dport 22 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized shell access attempts.
  • Disable SSH or restrict it to minimal necessary users and networks.

🔍 How to Verify

Check if Vulnerable:

Check the CloudLink version via admin interface or command line; if between 8.0 and 8.1.2, it is vulnerable.

Check Version:

cloudlink --version or check via web admin panel

Verify Fix Applied:

Confirm the version is updated beyond 8.1.2 and test restricted shell functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SSH login attempts from privileged users
  • Commands executed outside restricted shell in system logs

Network Indicators:

  • SSH connections to CloudLink server from unexpected sources

SIEM Query:

source="cloudlink_logs" AND (event="shell_escape" OR ssh_login AND user="privileged_user")

🔗 References

📤 Share & Export