
Dell has released a security update for Unity OS version 5.4 and earlier, addressing a set of critical vulnerabilities that expose the popular enterprise storage systems—Unity, UnityVSA, and Unity XT—to unauthenticated remote command execution, file deletion, open redirects, and privilege escalation.
Among the most severe of these is CVE-2025-22398, a command injection flaw with a CVSS base score of 9.8, which enables unauthenticated attackers to execute arbitrary operating system commands as root—potentially allowing full system takeover.
The security advisory details multiple Common Vulnerabilities and Exposures (CVEs) that impact Dell Unity products. Here’s a breakdown of the key vulnerabilities:
- CVE-2025-22398 (CVSS Score: 9.8)– Remote OS Command Injection
“An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker,” Dell warns. Exploiting this flaw requires no authentication and grants attackers root-level access, making it one of the most dangerous bugs disclosed in recent Unity firmware.
- CVE-2025-24383 (CVSS Score: 9.1) – Arbitrary File Deletion
This second OS command injection bug allows attackers to delete arbitrary files on the system, also as root, without prior authentication. “This vulnerability is considered critical as it can be leveraged to delete critical system files as root.”
- CVE-2025-24381 (CVSS Score: 8.8) – Open Redirect Vulnerability
A misconfigured URL redirection mechanism could allow attackers to trick Unity users into visiting malicious sites, potentially leading to phishing and session hijacking. “Exploitation may allow for session theft.”
- CVE-2024-49563 and Others (CVSS Score: 7.8) – Local Privilege Escalation
A series of OS command injection vulnerabilities, including CVE-2024-49563, CVE-2025-24377, CVE-2025-24378, CVE-2025-24379, and others, allow low-privileged local users to escalate to root-level privileges. “A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges.”
The affected products are Dell Unity, Dell UnityVSA, and Dell Unity XT running versions 5.4 and prior.
Dell has released a remediation in the form of Dell Unity Operating Environment (OE) Version 5.5.0.0.5.259 or later. Dell strongly recommends that customers upgrade to this version at the earliest opportunity to mitigate the risks associated with these vulnerabilities.
Given the critical nature of some of these vulnerabilities, particularly the OS Command Injection and arbitrary file deletion issues, it is imperative that Dell Unity customers take immediate action. Upgrading to the remediated version is crucial to protect systems from potential exploitation.