CVE-2025-45379

Dell · Dell CloudLink

A high-severity vulnerability has been discovered in Dell CloudLink software that could allow a remote, unauthenticated attacker to execute arbitrary code on affected systems.

Executive summary

A high-severity vulnerability has been discovered in Dell CloudLink software that could allow a remote, unauthenticated attacker to execute arbitrary code on affected systems. Successful exploitation of this flaw could lead to a complete system compromise, enabling data theft, service disruption, and further unauthorized access into the corporate network.

Vulnerability

This vulnerability is a pre-authentication command injection flaw within the management interface of Dell CloudLink. An unauthenticated attacker on the same network segment can send a specially crafted request to a vulnerable API endpoint. Due to improper input validation, the attacker's payload is executed as a system command with the privileges of the CloudLink service, leading to remote code execution (RCE).

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.4. Exploitation could have a significant negative impact on the business. An attacker could leverage this flaw to access or exfiltrate sensitive data managed by CloudLink, deploy ransomware, disrupt critical services, or use the compromised system as a pivot point to move laterally across the network. The potential consequences include major data breaches, operational downtime, financial loss, and reputational damage.

Remediation

Immediate Action: Organizations must apply the security updates provided by Dell to upgrade all instances of Dell CloudLink to version 8.0 or later. Following the update, review system and application access logs for any anomalous activity or connections that may indicate a compromise occurred prior to patching.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for unusual outbound network traffic from CloudLink servers, unexpected processes spawned by the CloudLink service account, and suspicious requests to the management interface in web server and application logs.

Compensating Controls: If immediate patching is not feasible, restrict network access to the Dell CloudLink management interface to a limited set of trusted administrative IP addresses using a firewall. If exposed, place the interface behind a Web Application Firewall (WAF) with rules designed to block common command injection patterns.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.4 and the risk of remote code execution, this vulnerability poses a significant threat to the organization. We strongly recommend that all vulnerable Dell CloudLink instances be patched immediately, treating this as a top priority. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a likely candidate for future inclusion. If patching is delayed for any reason, the compensating controls outlined above must be implemented without delay to reduce the attack surface.