Cyber Posture

CVE-2025-23383

High

Published: 28 March 2025

Published
28 March 2025
Modified
08 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-23383 is an Improper Neutralization of Special Elements used in an OS Command, classified as an OS Command Injection vulnerability (CWE-78), affecting Dell Unity storage systems in versions 5.4 and prior. Published on 2025-03-28, this flaw allows special elements in OS commands to be inadequately sanitized, enabling malicious input to alter command execution.

A low-privileged attacker with local access can exploit CVE-2025-23383 to achieve arbitrary command execution and privilege escalation. The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high impacts on confidentiality, integrity, and availability in a local attack scenario with low complexity and no user interaction required.

Dell's security advisory DSA-2025-116 details a security update addressing multiple vulnerabilities, including CVE-2025-23383, in Dell Unity, Dell UnityVSA, and Dell Unity XT systems. Security practitioners should review the advisory at https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities for patch deployment and mitigation guidance.

Details

CWE(s)
CWE-78

Affected Products

dell
unity operating environment
≤ 5.5.0.0.5.259

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection (CWE-78) directly enables arbitrary command execution via Unix shell (T1059.004) and privilege escalation (T1068) for local low-privileged attackers.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References