LOWCVE-2025-36576CVSS 2.7

CVE-2025-36576: CSRF in Dell Wyse Management Suite

Platform

other

Component

wyse-management-suite

Fixed in

5.2

AI Confidence: highNVDEPSS 0.0%Reviewed: May 2026

A Cross-Site Request Forgery (CSRF) vulnerability has been identified in Dell Wyse Management Suite versions prior to 5.2. This vulnerability allows a remote, high-privileged attacker to potentially exploit the system, leading to server-side request forgery. Affected versions include those equal to or less than 5.2. Dell has released version 5.2 to address this issue.

Impact and Attack Scenarios

The CSRF vulnerability in Wyse Management Suite allows an attacker to trick a legitimate user into unknowingly executing malicious requests on their behalf. This can lead to unauthorized changes to the Wyse Management Suite configuration, potentially granting the attacker control over managed devices. Successful exploitation could involve modifying device settings, installing malicious software, or exfiltrating sensitive data stored within the management suite. The blast radius extends to all devices managed by the vulnerable instance of Wyse Management Suite, making it a significant risk for organizations relying on centralized device management.

Exploitation Context

This vulnerability has a LOW CVSS score of 2.7. No public proof-of-concept (POC) code has been released as of the publication date. It is not currently listed on the CISA KEV catalog. Given the relatively low CVSS score and lack of public exploits, the immediate risk of active exploitation is considered low, but proactive patching is still recommended.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO
Internet ExposureHigh

EPSS

0.04% (12% percentile)

CISA SSVC

Exploitationnone
Automatableno
Technical Impactpartial

CVSS Vector

THREAT INTELLIGENCE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L2.7LOWAttack VectorNetworkHow the attacker reaches the targetAttack ComplexityLowConditions required to exploitPrivileges RequiredHighAuthentication level needed to attackUser InteractionNoneWhether a victim must take actionScopeUnchangedImpact beyond the vulnerable componentConfidentialityNoneRisk of sensitive data exposureIntegrityNoneRisk of unauthorized data modificationAvailabilityLowRisk of service disruptionnextguardhq.com · CVSS v3.1 Base Score
What do these metrics mean?
Attack Vector
Network — remotely exploitable over the internet. No physical or local access required. Widest attack surface.
Attack Complexity
Low — no special conditions required. Attacker can exploit reliably without depending on rare configurations or timing.
Privileges Required
High — admin or privileged account required to exploit.
User Interaction
None — attack is automatic and silent. Victim does nothing: no click, no file open.
Scope
Unchanged — impact is limited to the vulnerable component itself.
Confidentiality
None — no confidentiality impact. Attacker cannot read protected data.
Integrity
None — no integrity impact. Attacker cannot modify data.
Availability
Low — partial or intermittent denial of service. Attacker can degrade performance.

Affected Software

Componentwyse-management-suite
VendorDell
Affected rangeFixed in
N/A – 5.25.2

Weakness Classification (CWE)

Timeline

  1. Reserved
  2. Published
  3. EPSS updated

Mitigation and Workarounds

The primary mitigation for CVE-2025-36576 is to upgrade to Dell Wyse Management Suite version 5.2 or later. If immediate upgrading is not possible, implement strict input validation on all user-supplied data to prevent malicious requests. Consider implementing CSRF tokens on sensitive actions within the Wyse Management Suite interface. Web application firewalls (WAFs) configured to detect and block CSRF attacks can provide an additional layer of defense. Regularly review access logs for suspicious activity.

How to fix

Update Dell Wyse Management Suite to version 5.2 or later. This update addresses the CSRF vulnerability. See the Dell security advisory for more details and upgrade instructions.

CVE Security Newsletter

Vulnerability analysis and critical alerts directly to your inbox.

Frequently asked questions

What is CVE-2025-36576 — CSRF in Dell Wyse Management Suite?

CVE-2025-36576 is a Cross-Site Request Forgery (CSRF) vulnerability affecting Dell Wyse Management Suite versions 5.2 and earlier, allowing attackers to perform server-side request forgery.

Am I affected by CVE-2025-36576 in Dell Wyse Management Suite?

You are affected if you are using Dell Wyse Management Suite version 5.2 or earlier. Upgrade to version 5.2 to mitigate the risk.

How do I fix CVE-2025-36576 in Dell Wyse Management Suite?

Upgrade to Dell Wyse Management Suite version 5.2 or later. Implement input validation and CSRF tokens as interim measures.

Is CVE-2025-36576 being actively exploited?

There are currently no reports of active exploitation, but proactive patching is still recommended.

Where can I find the official Dell advisory for CVE-2025-36576?

Refer to the official Dell Security Advisory for CVE-2025-36576 on the Dell Support website.

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.