Wednesday, April 2, 2025
HomeCVE/vulnerabilityMultiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Published on

SIEM as a Service

Follow Us on Google News

Dell Technologies has released a security advisory detailing multiple critical vulnerabilities in its Dell Unity storage systems and related software.

These vulnerabilities, if exploited, could allow attackers to gain unauthorized access, execute arbitrary commands, or even compromise the affected systems entirely.

Vulnerabilities Explained

The advisory, issued under reference DSA-2025-116, highlights serious weaknesses in Dell Unity, UnityVSA, and Unity XT platforms, including their operating environment (OE).

These vulnerabilities affect versions before 5.5.0.0.5.259 and stem from several issues such as improper neutralization of special elements in system commands, open redirect flaws, and OS command injection vulnerabilities.

Key CVEs Identified

  • CVE-2025-22398: This critical vulnerability allows unauthenticated attackers to execute arbitrary OS commands remotely. Exploitation could lead to complete control over the system with root privileges.
  • CVE-2025-24383: Similar to CVE-2025-22398, this allows attackers to delete critical system files remotely.
  • CVE-2025-24381: An open redirect vulnerability could enable attackers to redirect users to malicious sites, potentially leading to phishing attacks or session hijacking.
  • CVE-2024-49563 to CVE-2025-24386: Several local privilege-escalation flaws were reported, enabling attackers with limited access to execute commands with root privileges.

Dell has acknowledged the contributions of security researchers, including teams from Ubisectech Sirius, who reported many of these vulnerabilities.

Impact on Users

The vulnerabilities have been classified as critical, with high CVSS scores ranging from 7.3 to 9.8. Exploitation risks include:

  • Complete system compromise.
  • Arbitrary file deletion, which could disrupt critical functions.
  • Potential for phishing attacks.
  • Local and remote elevation of privileges.

Given the severity, these flaws pose a significant risk to enterprises relying on Dell Unity systems for their storage solutions.

Mitigation and Updates

Dell has released version 5.5.0.0.5.259 of the Unity Operating Environment (OE) to address these vulnerabilities. Customers are strongly advised to upgrade immediately to mitigate risks.

  1. Confirm whether your Unity systems are running a version prior to 5.5.0.0.5.259.
  2. Download and apply the updated software via Dell Support (link).
  3. Follow Dell’s best practices to secure your systems and minimize potential exploits.

Organizations using Dell Unity solutions should prioritize this patch to secure their infrastructures and prevent potential attacks.

Dell credited independent researchers, including Prowser and the Ubisectech Sirius Team, for their contributions in identifying these vulnerabilities.

The company recommends that customers assess the applicability of these findings to their environments and take swift action.

Dell has reiterated its commitment to strengthening security in its products through collaboration with the cybersecurity community.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has...

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...