Introduction
An attacker with credentials to a Dell Unity storage system can escape the restricted shell and execute arbitrary commands as root. This vulnerability impacts the integrity and availability of enterprise storage environments running affected versions. Dell Unity is a widely deployed enterprise storage platform, serving thousands of organizations globally with critical data storage and management capabilities. The platform's reliability and security are central to the operations of many large enterprises and service providers.
Technical Information
CVE-2025-36607 is an OS command injection vulnerability in the svc_nas
utility of Dell Unity Operating Environment, affecting versions 5.5 and prior. The root cause is improper neutralization of special elements used in OS commands (CWE-78). The vulnerability allows an authenticated attacker to supply crafted input to the svc_nas
utility, which is then executed by the shell with root privileges. This enables the attacker to escape the restricted shell environment and run arbitrary commands as root on the underlying operating system.
The attack requires local access with valid credentials. Exploitation does not require user interaction and has low complexity once access is obtained. The vulnerability is not known to be remotely exploitable without authentication, but it could be chained with other vulnerabilities or credential compromise.
No public code snippets or exploit samples are available at this time. The vulnerability is closely related to other command injection issues recently disclosed in Dell Unity utilities, such as svc_nfssupport
(CVE-2025-36606) and unauthenticated remote command injection in other components (CVE-2025-36604).
Patch Information
Dell Technologies has addressed multiple security vulnerabilities in Dell Unity, UnityVSA, and Unity XT systems by releasing an updated version of the Dell Unity Operating Environment (OE). (dell.com)
Key Updates in Version 5.5.1:
-
OS Command Injection Vulnerabilities:
- CVE-2025-36604: Resolved an issue where unauthenticated remote attackers could execute arbitrary commands.
- CVE-2025-36606 & CVE-2025-36607: Fixed vulnerabilities in the
svc_nfssupport
andsvc_nas
utilities that allowed authenticated users to escape the restricted shell and execute commands with root privileges.
-
Cross-Site Scripting (XSS) Vulnerability:
- CVE-2025-36605: Addressed a flaw that permitted unauthenticated attackers to inject malicious scripts, potentially leading to information disclosure or session theft.
Recommendations:
To mitigate these vulnerabilities, it is crucial to upgrade to Dell Unity OE version 5.5.1 or later. The updated firmware is available for download on Dell's official support page. (dell.com)
Upgrade Steps:
- Backup Data: Ensure all critical data is backed up before initiating the upgrade.
- Review Release Notes: Familiarize yourself with the release notes to understand the changes and improvements.
- Download Firmware: Access the Dell support portal to download the latest firmware version.
- Follow Upgrade Procedures: Adhere to the official upgrade procedures provided by Dell to ensure a smooth transition.
By promptly applying this update, organizations can safeguard their systems against potential exploits targeting these vulnerabilities.
Affected Systems and Versions
- Dell Unity Operating Environment versions 5.5 and prior
- Affects all configurations where the
svc_nas
utility is present and accessible - Also relevant for Dell UnityVSA and Dell Unity XT systems running affected OE versions
Vendor Security History
Dell Unity has experienced a series of command injection vulnerabilities in 2025, including:
- CVE-2025-36604: Unauthenticated remote OS command injection
- CVE-2025-36606: Authenticated OS command injection in
svc_nfssupport
- CVE-2025-22398: Critical unauthenticated command execution vulnerability (March 2025)
Dell has responded with coordinated security advisories and timely patches, but the recurrence of similar vulnerabilities in core utilities suggests ongoing challenges in input validation and secure coding practices within the product line.