Cyber Posture

CVE-2025-21105

MediumLPE

Published: 20 February 2025

Published
20 February 2025
Modified
31 July 2025
KEV Added
Patch
CVSS Score 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
EPSS Score 0.0005 14.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-21105 is a medium-severity Improper Access Control (CWE-284) vulnerability in Dell Recoverpoint For Virtual Machines. Its CVSS base score is 6.6 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 14.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations to prevent low-privileged users from executing the vulnerable binary and performing unauthorized administrative actions.

prevent

Applies least privilege to restrict low-privileged users from running binaries capable of administrative functions like server shutdown or configuration modification.

prevent

Remediates the improper access control flaw in the RecoverPoint binary through timely patching as provided in Dell's DSA-2025-101 advisory.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Improper access control enables low-priv local users to run an admin binary for command execution and privileged actions, directly mapping to exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting…

more

down the server, modifying the configuration leading to gain access to unauthorized data.

Deeper analysisAI

CVE-2025-21105 is a command execution vulnerability in Dell RecoverPoint for Virtual Machines version 6.0.X. Published on 2025-02-20, it stems from improper access control (CWE-284) that enables execution of unauthorized commands through a specific binary. The vulnerability carries a CVSS v3.1 base score of 6.6 (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L), indicating medium severity with local impact potential.

A low-privileged malicious user with local access can exploit the vulnerability by running the affected binary. This allows them to perform any administrative actions permitted by the binary, such as shutting down the server, modifying configurations, or gaining access to unauthorized data.

Dell has addressed this issue in security advisory DSA-2025-101, which provides updates for multiple component vulnerabilities in RecoverPoint for Virtual Machines. Practitioners should refer to the advisory at https://www.dell.com/support/kbdoc/en-us/000287503/dsa-2025-101-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-component-vulnerabilities for patching details and mitigation guidance.

Details

CWE(s)

Affected Products

dell
recoverpoint for virtual machines
6.0

CVEs Like This One

CVE-2025-46691Same vendor: Dell
CVE-2026-22769Same product: Dell Recoverpoint For Virtual Machines
CVE-2024-49561Same vendor: Dell
CVE-2026-22768Same vendor: Dell
CVE-2025-27688Same vendor: Dell
CVE-2026-32655Same vendor: Dell
CVE-2026-27102Same vendor: Dell
CVE-2024-48013Same vendor: Dell
CVE-2026-21418Same vendor: Dell
CVE-2026-25908Same vendor: Dell

References