CVE-2025-24382
Published: 28 March 2025
Summary
CVE-2025-24382 is a high-severity OS Command Injection (CWE-78) vulnerability in Dell Unity Operating Environment. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation of information inputs, directly preventing OS command injection by neutralizing special elements used in commands.
SI-2 requires timely identification and remediation of flaws, such as applying Dell's patch for this specific command injection vulnerability.
SC-7 enforces boundary protection at external interfaces, limiting remote network access exploited by unauthenticated attackers for command injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection (CWE-78) in network-accessible Dell Unity management interface enables remote unauthenticated arbitrary command execution, directly mapping to exploitation of public-facing applications (T1190) and Unix shell command execution (T1059.004).
NVD Description
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution.
Deeper analysisAI
CVE-2025-24382 is an Improper Neutralization of Special Elements used in an OS Command, classified as an OS Command Injection vulnerability (CWE-78), affecting Dell Unity versions 5.4 and prior. Published on 2025-03-28, the vulnerability carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and low complexity.
An unauthenticated attacker with remote network access can exploit this vulnerability to achieve arbitrary command execution on the affected system, potentially compromising confidentiality, integrity, and availability with low impact in each category.
Dell has issued security advisory DSA-2025-116, detailing a security update addressing multiple vulnerabilities, including this one, in Dell Unity, Dell UnityVSA, and Dell Unity XT. For mitigation details, refer to https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities.
Details
- CWE(s)