CVE-2025-46608

9.1 CRITICAL

📋 TL;DR

Dell Data Lakehouse versions before 1.6.0.0 have an improper access control vulnerability that allows high-privileged attackers with remote access to elevate their privileges. This critical vulnerability could lead to unauthorized access with elevated privileges, compromising system integrity and customer data. Organizations using affected Dell Data Lakehouse versions are at risk.

💻 Affected Systems

Products:
  • Dell Data Lakehouse
Versions: All versions prior to 1.6.0.0
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high-privileged attacker with remote access; vulnerability exists in the core access control mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains administrative control over the data lakehouse, accesses all customer data, modifies configurations, and potentially uses the system as a pivot point to attack other systems.

🟠

Likely Case

Privileged attacker gains unauthorized administrative access to the data lakehouse, potentially accessing sensitive customer data and modifying system configurations.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to the data lakehouse system itself, though data confidentiality and integrity remain at risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires high-privileged access but the vulnerability itself is in access control mechanisms, making exploitation straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.0.0 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000390529/dsa-2025-375-security-update-for-dell-data-lakehouse-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download Dell Data Lakehouse version 1.6.0.0 or later from Dell support portal. 2. Backup current configuration and data. 3. Stop all Data Lakehouse services. 4. Install the updated version following Dell's installation guide. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Data Lakehouse management interfaces to only authorized administrative networks

Privilege Reduction

all

Review and minimize high-privileged accounts with remote access to Data Lakehouse

🧯 If You Can't Patch

  • Implement strict network access controls to limit remote access to Data Lakehouse management interfaces
  • Enable detailed audit logging for all privileged access attempts and regularly review logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Dell Data Lakehouse via the management console or configuration files

Check Version:

Check version in Data Lakehouse management interface or configuration files (specific command depends on deployment)

Verify Fix Applied:

Verify the version is 1.6.0.0 or later and test that access control policies are properly enforced

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Multiple failed access attempts followed by successful privileged access
  • Configuration changes from non-standard administrative accounts

Network Indicators:

  • Unusual remote connections to management interfaces
  • Traffic patterns indicating privilege escalation attempts

SIEM Query:

source="dell_data_lakehouse" AND (event_type="privilege_escalation" OR event_type="access_control_violation")

🔗 References

📤 Share & Export