CVE-2025-43992
Authentication Bypass in Dell ECS and ObjectScale via Geo Replication
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | ecs | From 3.8.1.0 (inc) to 3.8.1.7 (inc) |
| dell | objectscale | to 4.3.0.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-302 | The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0. It is an authentication bypass caused by an assumed-immutable data issue in Geo replication. An unauthenticated attacker with remote access could exploit this flaw to gain unauthorized access to data while it is being transmitted.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to data in transit by an unauthenticated remote attacker. This means sensitive information being replicated geographically could be exposed or intercepted, potentially compromising confidentiality, integrity, and availability of the data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unauthenticated attacker to bypass authentication and gain unauthorized access to data in transit within Dell ECS and Dell ObjectScale systems. Such unauthorized access to data in transit could potentially lead to violations of data protection requirements mandated by standards and regulations like GDPR and HIPAA, which require the protection of sensitive data against unauthorized access.
However, specific impacts on compliance with these standards depend on the context of data handled and the implementation of additional security controls.