First published: Fri Mar 28 2025(Updated: )
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it can be leveraged to completely compromise the operating system. Dell recommends customers to upgrade at the earliest opportunity.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Unity | <=5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22398 is classified as a high severity OS Command Injection vulnerability.
To fix CVE-2025-22398, upgrade to Dell Unity version 5.5 or later where the vulnerability has been patched.
CVE-2025-22398 allows unauthenticated remote attackers to execute arbitrary commands with root privileges.
Yes, CVE-2025-22398 can be exploited with minimal technical skills due to its nature of allowing remote code execution.
CVE-2025-22398 affects Dell Unity versions 5.4 and prior.