Dell Secure Connect Gateway Vulnerability in SRS Configuration
CVE-2025-26475

5.5MEDIUM

Key Information:

Vendor
Dell
Vendor
CVE Published:
19 March 2025

What is CVE-2025-26475?

CVE-2025-26475 is a vulnerability found in the Dell Secure Connect Gateway (SCG) 5.0 Appliance, specifically in its Secure Remote Service (SRS) configuration. This product is designed to enhance security and operational efficiency for organizations by enabling features such as Live-Restore. However, this vulnerability could have negative implications, impacting security protocols and exposing organizations to risks associated with misconfigurations and security failures during system operations.

Technical Details

The vulnerability is located within the SRS configuration of the Dell Secure Connect Gateway version 5.26, which is responsible for maintaining services during daemon restarts. While the Live-Restore feature is meant to bolster security by minimizing downtime and ensuring that essential security controls remain active, the vulnerability could potentially be exploited, undermining its purpose and allowing for operational weaknesses in the system.

Potential Impact of CVE-2025-26475

  1. Security Control Erosion: The vulnerability could lead to failures in enforcing security measures, exposing sensitive data and infrastructure during system maintenance events when Live-Restore is intended to be active.

  2. Increased Risk of Misconfiguration: Organizations could inadvertently misconfigure their security settings, leading to heightened exposure to threats and a greater likelihood of successful attacks.

  3. Operational Downtime: If exploited, this vulnerability may result in significant operational disruptions, affecting the availability and reliability of services reliant on the Dell Secure Connect Gateway.

Affected Version(s)

Secure Connect Gateway (SCG) 5.0 Appliance - SRS 5.26.00.20

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.