Dell Wyse Management Suite, Versionen vor WMS 5.2, enthalten eine Cross-Site Request Forgery (CSRF) Schwachstelle. Ein Angreifer mit hohen Rechten und Remote-Zugriff könnte diese Schwachstelle potenziell ausnutzen.
Plattform
other
Komponente
wyse-management-suite
Behoben in
5.2
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in Dell Wyse Management Suite versions prior to 5.2. This vulnerability allows a remote, high-privileged attacker to potentially exploit the system, leading to server-side request forgery. Affected versions include those equal to or less than 5.2. Dell has released version 5.2 to address this issue.
Auswirkungen und Angriffsszenarien
The CSRF vulnerability allows an attacker to trick a legitimate user into unknowingly executing malicious actions on the Wyse Management Suite server. This could involve unauthorized configuration changes, data manipulation, or other actions that the attacker can trigger through crafted requests. The impact is amplified if the attacker can impersonate a user with high privileges within the management suite, granting them broader control over the system. While the CVSS score is LOW, the potential for server-side request forgery highlights the need for mitigation, especially in environments with sensitive data or critical infrastructure managed by Wyse Management Suite.
Ausnutzungskontext
CVE-2025-36576 was published on 2025-06-10. No public proof-of-concept (POC) code is currently available. The vulnerability's CVSS score of 2.7 indicates a low probability of exploitation, but the potential for server-side request forgery warrants attention. It is not currently listed on the CISA KEV catalog.
Wer Ist Gefährdetwird übersetzt…
Organizations utilizing Dell Wyse Management Suite for centralized device management are at risk, particularly those running versions prior to 5.2. Environments with limited network segmentation or where user accounts have elevated privileges are especially vulnerable.
Angriffszeitlinie
- Disclosure
disclosure
Bedrohungsanalyse
Exploit-Status
EPSS
0.04% (12% Perzentil)
CISA SSVC
CVSS-Vektor
Was bedeuten diese Metriken?
- Attack Vector
- Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
- Attack Complexity
- Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
- Privileges Required
- Hoch — Administrator- oder Privilegienkonto erforderlich.
- User Interaction
- Keine — automatischer und lautloser Angriff. Das Opfer tut nichts.
- Scope
- Unverändert — Auswirkung auf das anfällige Komponente beschränkt.
- Confidentiality
- Keine — kein Vertraulichkeitseinfluss.
- Integrity
- Keine — kein Integritätseinfluss.
- Availability
- Niedrig — partieller oder intermittierender Denial of Service.
Betroffene Software
Schwachstellen-Klassifikation (CWE)
Zeitleiste
- Reserviert
- Veröffentlicht
- EPSS aktualisiert
Mitigation und Workarounds
The primary mitigation for CVE-2025-36576 is to upgrade Dell Wyse Management Suite to version 5.2 or later, which contains the fix. If an immediate upgrade is not feasible, consider implementing stricter input validation and output encoding on all user-supplied data to prevent the injection of malicious scripts. Implementing robust access controls and multi-factor authentication can also help limit the potential impact of a successful CSRF attack. Regularly review and audit user permissions to ensure least privilege access.
So beheben
Aktualisieren Sie Dell Wyse Management Suite auf Version 5.2 oder höher. Dieses Update behebt die CSRF-Schwachstelle. Weitere Details und Update-Anweisungen finden Sie in der Dell Sicherheitsmitteilung.
CVE-Sicherheitsnewsletter
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
Häufig gestellte Fragenwird übersetzt…
What is CVE-2025-36576 — CSRF in Dell Wyse Management Suite?
CVE-2025-36576 is a Cross-Site Request Forgery (CSRF) vulnerability affecting Dell Wyse Management Suite versions 5.2 and earlier, allowing attackers to perform server-side request forgery.
Am I affected by CVE-2025-36576 in Dell Wyse Management Suite?
You are affected if you are using Dell Wyse Management Suite version 5.2 or earlier. Upgrade to version 5.2 to mitigate the risk.
How do I fix CVE-2025-36576 in Dell Wyse Management Suite?
Upgrade to Dell Wyse Management Suite version 5.2 or later. Implement input validation and CSRF tokens as interim measures.
Is CVE-2025-36576 being actively exploited?
There are currently no reports of active exploitation, but proactive patching is still recommended.
Where can I find the official Dell advisory for CVE-2025-36576?
Refer to the official Dell Security Advisory for CVE-2025-36576 on the Dell Support website.
Ist dein Projekt betroffen?
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.