Dell Data Lakehouse, versions prior to 1.6.0.0, contain(s) an Improper Access Control vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges. This vulnerability is considered Critical, as it may result in unauthorized access with elevated privileges, compromising system integrity and customer data. Dell recommends customers upgrade to the latest version at the earliest opportunity.
History

Thu, 13 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell data Lakehouse
Vendors & Products Dell
Dell data Lakehouse

Wed, 12 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
Description Dell Data Lakehouse, versions prior to 1.6.0.0, contain(s) an Improper Access Control vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges. This vulnerability is considered Critical, as it may result in unauthorized access with elevated privileges, compromising system integrity and customer data. Dell recommends customers upgrade to the latest version at the earliest opportunity.
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published: 2025-11-12T20:12:59.795Z

Updated: 2025-11-13T21:23:27.791Z

Reserved: 2025-04-25T05:03:51.784Z

Link: CVE-2025-46608

cve-icon Vulnrichment

Updated: 2025-11-13T21:23:21.339Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-12T21:15:50.300

Modified: 2025-11-14T16:42:30.503

Link: CVE-2025-46608

cve-icon Redhat

No data.