31 Mar
31Mar

Dell has released a security update for Unity OS version 5.4 and earlier, addressing a set of critical vulnerabilities that expose the popular enterprise storage systemsβ€”Unity, UnityVSA, and Unity XTβ€”to unauthenticated remote command execution, file deletion, open redirects, and privilege escalation.
Among the most severe of these is CVE-2025-22398, a command injection flaw with a CVSS base score of 9.8, which enables unauthenticated attackers to execute arbitrary operating system commands as rootβ€”potentially allowing full system takeover.
The security advisory details multiple Common Vulnerabilities and Exposures (CVEs) that impact Dell Unity products. Here’s a breakdown of the key vulnerabilities:
CVE-2025-22398 (CVSS Score: 9.8)– Remote OS Command Injectionβ€œAn unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker,” Dell warns. Exploiting this flaw requires no authentication and grants attackers root-level access, making it one of the most dangerous bugs disclosed in recent Unity firmware.
CVE-2025-24383 (CVSS Score: 9.1) – Arbitrary File DeletionThis second OS command injection bug allows attackers to delete arbitrary files on the system, also as root, without prior authentication. β€œThis vulnerability is considered critical as it can be leveraged to delete critical system files as root.”
CVE-2025-24381  (CVSS Score: 8.8) – Open Redirect VulnerabilityA misconfigured URL redirection mechanism could allow attackers to trick Unity users into visiting malicious sites, potentially leading to phishing and session hijacking. β€œExploitation may allow for session theft.”
CVE-2024-49563 and Others  (CVSS Score: 7.8) – Local Privilege EscalationA series of OS command injection vulnerabilities, including CVE-2024-49563, CVE-2025-24377, CVE-2025-24378, CVE-2025-24379, and others, allow low-privileged local users to escalate to root-level privileges. β€œA low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges.”
The affected products are Dell Unity, Dell UnityVSA, and Dell Unity XT running versions 5.4 and prior.
Dell has released a remediation in the form of Dell Unity Operating Environment (OE) Version 5.5.0.0.5.259 or later. Dell strongly recommends that customers upgrade to this version at the earliest opportunity to mitigate the risks associated with these vulnerabilities.
Given the critical nature of some of these vulnerabilities, particularly the OS Command Injection and arbitrary file deletion issues, it is imperative that Dell Unity customers take immediate action. Upgrading to the remediated version is crucial to protect systems from potential exploitation.

Comments
* The email will not be published on the website.