CVE-2025-46425

6.5 MEDIUM

📋 TL;DR

This XXE vulnerability in Dell Storage Manager allows attackers to read arbitrary files on the server or potentially cause denial of service. It affects organizations using Dell Storage Center with Storage Manager version 20.1.20, requiring only low-privileged remote access for exploitation.

💻 Affected Systems

Products:
  • Dell Storage Center - Dell Storage Manager
Versions: 20.1.20
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged remote access to the Storage Manager interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through file disclosure leading to credential theft, configuration exposure, and potential lateral movement within the storage infrastructure.

🟠

Likely Case

Unauthorized access to sensitive configuration files, logs, or credentials stored on the Storage Manager server, potentially enabling further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external attackers from reaching the vulnerable service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low-privileged credentials and ability to submit XML data to vulnerable endpoints

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version specified in DSA-2025-393

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000382899/dsa-2025-393-security-update-for-storage-center-dell-storage-manager-vulnerabilities

Restart Required: No

Instructions:

1. Review DSA-2025-393 advisory. 2. Download and apply the security update from Dell Support. 3. Verify the update was successful using version check commands.

🔧 Temporary Workarounds

Disable XML External Entity Processing

all

Configure XML parser to disable external entity resolution if supported by the application

Network Segmentation

all

Restrict access to Storage Manager interface to trusted management networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit Storage Manager access to authorized management IPs only
  • Monitor for unusual XML parsing activity or file access attempts in application logs

🔍 How to Verify

Check if Vulnerable:

Check Storage Manager version via web interface or CLI. If version is 20.1.20, system is vulnerable.

Check Version:

Check via Storage Manager web interface or consult Dell documentation for CLI version check

Verify Fix Applied:

Verify version has been updated to a version later than 20.1.20 as specified in the Dell advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • File access attempts via XML payloads
  • Multiple failed authentication attempts followed by XML submissions

Network Indicators:

  • XML payloads containing external entity references (DOCTYPE, SYSTEM, ENTITY)
  • Unusual outbound connections from Storage Manager server

SIEM Query:

source="dell-storage-manager" AND (message="*DOCTYPE*" OR message="*ENTITY*" OR message="*SYSTEM*")

🔗 References

📤 Share & Export