CVE-2025-36607

Dell · Dell Multiple Products

A high-severity vulnerability has been discovered in Dell Unity storage platforms, which could allow an authenticated attacker to gain unauthorized access to sensitive data.

Executive summary

A high-severity vulnerability has been discovered in Dell Unity storage platforms, which could allow an authenticated attacker to gain unauthorized access to sensitive data. Successful exploitation could lead to a significant data breach or data integrity loss, enabling an attacker to read, modify, or delete critical business information stored on the affected systems. Organizations are urged to apply the vendor-provided security patches immediately to mitigate the risk of compromise.

Vulnerability

The vulnerability is a command injection flaw within the web-based management interface of the Dell Unity Operating Environment (OE). An attacker with low-privileged, authenticated access to the management interface can inject and execute arbitrary OS commands with elevated privileges on the underlying system. This is achieved by sending a specially crafted request to an internal API endpoint responsible for system diagnostics, which fails to properly sanitize user-supplied input before passing it to a system shell.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8, posing a significant risk to the organization. Exploitation could directly lead to the compromise of data confidentiality and integrity, as an attacker could access, exfiltrate, or maliciously alter critical business data, backups, and application files stored on the Dell Unity array. This could result in severe financial loss, regulatory fines (e.g., GDPR, HIPAA), reputational damage, and disruption to business operations that rely on the integrity of the stored data. The low complexity of the attack increases the likelihood of exploitation by a malicious insider or an external actor who has compromised a low-level user account.

Remediation

Immediate Action:

  • Identify all Dell Unity systems running the affected software versions within the environment.
  • Apply the security updates provided by Dell immediately, following the organization's change management procedures.
  • Prioritize patching for systems with management interfaces exposed to broader networks.
  • After patching, review access logs for the management interface for any signs of compromise or suspicious activity preceding the update.

Proactive Monitoring:

  • Monitor Dell Unity management interface logs for unusual or malformed API requests, especially to diagnostic endpoints.
  • Implement alerting for shell command executions on the appliance that deviate from normal administrative activity (e.g., whoami, ls, cat /etc/shadow).
  • Monitor for network connections originating from the storage appliance to unexpected internal or external destinations, which could indicate data exfiltration.

Compensating Controls:

  • If immediate patching is not feasible, restrict network access to the Dell Unity management interface to a secure, isolated management VLAN.
  • Implement strict firewall rules to only allow connections from a limited set of authorized administrator IP addresses.
  • Enforce the principle of least privilege by reviewing all user accounts on the Dell Unity system and revoking unnecessary permissions.
  • Increase the verbosity of logging for the management interface and ensure logs are forwarded to a centralized SIEM for correlation and analysis.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score and the critical role of Dell Unity storage systems in the enterprise, this vulnerability requires immediate attention. We strongly recommend that organizations prioritize the deployment of the vendor-supplied patches across all affected systems to prevent potential data compromise. While there is no current evidence of active exploitation, the risk profile is significant. Organizations should implement the suggested compensating controls, particularly network segmentation for the management interface, as an essential secondary defense in depth.