Cyber Posture

CVE-2025-26336

High

Published: 21 March 2025

Published
21 March 2025
Modified
27 March 2025
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
EPSS Score 0.0083 74.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26336 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dell Chassis Management Controller For Poweredge Fx2 Firmware. Its CVSS base score is 8.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely application of the vendor-recommended firmware updates to remediate the stack-based buffer overflow vulnerability.

prevent

Implements memory protection mechanisms such as stack canaries, ASLR, and DEP to prevent exploitation of the stack-based buffer overflow leading to remote code execution.

prevent

Enforces input validation and bounds checking to directly counter the buffer overflow vulnerability triggered by unauthenticated remote inputs.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote stack-based buffer overflow in network-accessible Chassis Management Controller firmware directly enables exploitation of a public-facing application for unauthenticated remote code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Dell Chassis Management Controller Firmware for Dell PowerEdge FX2, version(s) prior to 2.40.200.202101130302, and Dell Chassis Management Controller Firmware for Dell PowerEdge VRTX version(s) prior to 3.41.200.202209300499, contain(s) a Stack-based Buffer Overflow vulnerability. An unauthenticated attacker with remote access could…

more

potentially exploit this vulnerability, leading to Remote execution.

Deeper analysisAI

CVE-2025-26336 is a Stack-based Buffer Overflow vulnerability (CWE-121, CWE-787) affecting Dell Chassis Management Controller Firmware for Dell PowerEdge FX2 in versions prior to 2.40.200.202101130302 and for Dell PowerEdge VRTX in versions prior to 3.41.200.202209300499. Published on 2025-03-21, it carries a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H), indicating high severity due to its potential for significant impact.

An unauthenticated attacker with remote network access can exploit this vulnerability, which requires user interaction to trigger. Successful exploitation could lead to remote code execution, granting high confidentiality impact, low integrity impact, and high availability impact without changing scope.

Dell's security advisory DSA-2025-123 addresses this issue and related vulnerabilities in the Chassis Management Controller Firmware. It recommends updating to version 2.40.200.202101130302 or later for PowerEdge FX2 and 3.41.200.202209300499 or later for PowerEdge VRTX. Full details are available at https://www.dell.com/support/kbdoc/en-us/000297463/dsa-2025-123-security-update-for-dell-chassis-management-controller-firmware-for-dell-poweredge-fx2-and-vrtx-vulnerabilities.

Details

CWE(s)

Affected Products

dell
chassis management controller for poweredge fx2 firmware
≤ 2.40.200.202101130302
dell
chassis management controller for poweredge vrtx firmware
≤ 3.41.200.202209300499

CVEs Like This One

CVE-2026-26354Same vendor: Dell
CVE-2026-22266Same vendor: Dell
CVE-2025-43728Same vendor: Dell
CVE-2025-22475Same vendor: Dell
CVE-2026-26944Same vendor: Dell
CVE-2026-27101Same vendor: Dell
CVE-2025-43995Same vendor: Dell
CVE-2024-49601Same vendor: Dell
CVE-2025-41732Shared CWE-121, CWE-787
CVE-2026-23774Same vendor: Dell

References