TechAdvisor versions 2.6 through 3.37-30 for Dell XtremIO X2, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
History

Thu, 31 Jul 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell techadvisor
Vendors & Products Dell
Dell techadvisor

Wed, 30 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 18:00:00 +0000

Type Values Removed Values Added
Description TechAdvisor versions 2.6 through 3.37-30 for Dell XtremIO X2, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published: 2025-07-30T17:55:55.248Z

Updated: 2025-08-05T03:56:16.757Z

Reserved: 2025-02-07T06:04:04.738Z

Link: CVE-2025-26332

cve-icon Vulnrichment

Updated: 2025-07-30T18:11:44.528Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-30T18:15:30.510

Modified: 2025-07-31T18:42:37.870

Link: CVE-2025-26332

cve-icon Redhat

No data.