CVE-2025-36589

Dell · Dell Multiple Products

A high-severity vulnerability has been identified in Dell Unisphere for PowerMax, a critical storage management platform.

Executive summary

A high-severity vulnerability has been identified in Dell Unisphere for PowerMax, a critical storage management platform. Successful exploitation of this flaw could allow an authenticated attacker to gain administrative control over the system, potentially leading to unauthorized data access, modification, or service disruption of critical storage infrastructure. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

This vulnerability is a privilege escalation flaw within the Unisphere for PowerMax management interface. An authenticated, low-privileged user can send a specially crafted API request to a specific endpoint that fails to properly validate user permissions. By exploiting this flaw, the attacker can elevate their privileges to that of a full administrator, granting them complete control over the PowerMax storage management environment.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.6. The business impact of a successful exploit is significant, as it could grant an attacker complete administrative control over the organization's enterprise storage arrays managed by Unisphere. Potential consequences include the unauthorized access to sensitive corporate data, data theft, modification or deletion of critical information and backups, and the disruption of business-critical applications that rely on the PowerMax storage. This poses a direct threat to data confidentiality, integrity, and availability, and could result in financial loss, reputational damage, and regulatory penalties.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by Dell without delay. System administrators should consult the official Dell security advisory for this CVE to identify the appropriate patch for their specific version and deploy it according to their change management process. After patching, it is crucial to review access logs for any suspicious administrative activities that may have occurred prior to remediation.

Proactive Monitoring: Security teams should actively monitor for signs of compromise. This includes reviewing Unisphere for PowerMax application logs for unexpected or unauthorized administrative account creation, privilege escalations, or configuration changes. Monitor network traffic for unusual API calls to the management interface, especially from non-administrative network segments. Set up alerts for multiple failed login attempts followed by a success from an unfamiliar IP address.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Strictly limit network access to the Unisphere management interface to a dedicated management VLAN or trusted IP ranges. Enforce multi-factor authentication (MFA) for all administrative accounts. Enhance logging levels and implement real-time alerting for any administrative functions performed within the platform.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 7.6 and the critical role of PowerMax storage systems in the enterprise, this vulnerability requires immediate attention. We strongly recommend that all organizations using the affected versions of Dell Unisphere for PowerMax prioritize the deployment of vendor-supplied patches. While this CVE is not currently on the CISA KEV list, its potential impact on critical infrastructure makes it a prime candidate for future inclusion if widespread exploitation occurs. Proactive patching is the most effective strategy to prevent compromise.