CVE-2025-36588

Dell · Dell Unisphere for PowerMax

A high-severity vulnerability has been identified in Dell Unisphere for PowerMax version 10, a critical storage management platform.

Executive summary

A high-severity vulnerability has been identified in Dell Unisphere for PowerMax version 10, a critical storage management platform. Successful exploitation could allow a remote, unauthenticated attacker to take full control of the affected system, potentially leading to data theft, service disruption, and unauthorized access to the storage infrastructure. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

This vulnerability is a remote command injection flaw within an undisclosed API endpoint of the Unisphere for PowerMax management interface. An unauthenticated attacker can send a specially crafted HTTP request containing malicious commands to this endpoint. The application fails to properly sanitize the user-supplied input before executing it, allowing the attacker's commands to be run with the privileges of the Unisphere service account on the underlying server, leading to a full system compromise.

Business impact

This vulnerability presents a significant risk to the organization, categorized as High severity with a CVSS score of 8.8. Exploitation could have severe consequences, as Unisphere for PowerMax manages critical enterprise storage arrays. A successful attack could lead to the loss of confidentiality, integrity, and availability of all data managed by the platform, resulting in major business disruption, financial loss, and reputational damage. An attacker could exfiltrate sensitive data, delete backups, or deploy ransomware across the storage infrastructure.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by Dell to all affected Dell Unisphere for PowerMax instances immediately. Before patching, take a system snapshot or backup to ensure a rollback path. After patching, review system and application access logs for any signs of compromise or unusual activity preceding the update.

Proactive Monitoring: Implement enhanced monitoring on Unisphere for PowerMax servers. Security teams should look for unusual or malformed requests to the web interface/API in web server and application logs, especially from untrusted IP addresses. Monitor for unexpected outbound network connections from the server and use endpoint detection and response (EDR) tools to alert on suspicious processes spawned by the Unisphere service.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:

  • Restrict network access to the Unisphere for PowerMax management interface to a dedicated and secured management VLAN.
  • Use a firewall or network access control lists (ACLs) to allow connections only from a limited set of trusted administrator workstations.
  • If exposed, place a Web Application Firewall (WAF) in front of the interface with rules designed to block command injection patterns.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical role of Dell Unisphere for PowerMax in managing enterprise storage, this vulnerability should be treated as a top priority. Organizations must immediately identify all affected instances and apply the vendor-supplied patches. Although this vulnerability is not currently on the CISA KEV list, its severity makes it a strong candidate for future inclusion. Proactive patching is the most effective strategy to prevent potential exploitation and protect critical data assets.