SB2025052027 - Dell PowerFlex Rack update for third-party components



SB2025052027 - Dell PowerFlex Rack update for third-party components

Published: May 20, 2025

Security Bulletin ID SB2025052027
Severity
Critical
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 20% High 60% Medium 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2025-22224)

The vulnerability allows a malicious guest to execute arbitrary code on the hypervisor.

The vulnerability exists due to a boundary error in VMCI. A malicious guest with administrative privileges can trigger a heap-based buffer overflow and execute arbitrary code on the hypervisor in the context of VMX process.

Note, the vulnerability is being actively exploited in the wild.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2025-22225)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions. A malicious guest with access to the VMX process can write arbitrary data to kernel and bypass sandbox restrictions. 

Note, the vulnerability is being actively exploited in the wild.


3) Out-of-bounds read (CVE-ID: CVE-2025-22226)

The vulnerability allows a malicious guest to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in HGFS. A malicious guest can trigger an out-of-bounds read error and read contents of memory on the system.

Note, the vulnerability is being actively exploited in the wild.


4) Heap-based buffer overflow (CVE-ID: CVE-2024-38812)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the implementation of the DCERPC protocol. A remote attacker can send specially crafted packets to the affected server, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Input validation error (CVE-ID: CVE-2024-38813)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote authenticated user can send specially crafted packets to the server and execute arbitrary code with root privileges.


Remediation

Install update from vendor's website.