DSA-2025-169: Security Update for Dell iDRAC Tools Vulnerabilities
Summary: Dell iDRAC Tools remediation is available for an Improper Access Control vulnerability that could be exploited by malicious users to compromise the affected system.
Impact
High
Details
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|
CVE-2025-27689 |
Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. |
7.8 |
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|
CVE-2025-27689 |
Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. |
7.8 |
Affected Products & Remediation
|
Product |
Affected Versions |
Remediated Versions |
Link |
|
Dell iDRAC Tools |
Versions prior to 11.3.0.0 |
Version 11.3.0.0 or later |
Customer can download the SWB images from Dell Digital Lockers |
|
Product |
Affected Versions |
Remediated Versions |
Link |
|
Dell iDRAC Tools |
Versions prior to 11.3.0.0 |
Version 11.3.0.0 or later |
Customer can download the SWB images from Dell Digital Lockers |
- For full remediation, customers must upgrade to Dell iDRAC Tools Version 11.3.0.0 or later and the correct Windows Server 2025 version.
- It is recommended customers leverage the SWB image from the Dell Digital locker (How to Access Your Dell Digital Locker) which includes the remediated Dell iDRAC Tools version and the appropriate Windows Server 2025 version.
- Windows 2025 Server versions listed below:
- V51N7 - Windows Server 2025 Standard
- JT4MH - Windows Server 2025 Datacenter
- G5F67 - Windows Server 2025 Essentials
Revision History
|
Revision |
Date |
Description |
|
1.0 |
2025-06-12 |
Initial Release |
Acknowledgements
Dell would like to thank “falconCorrup” for reporting this issue.