Dell XtremIO, version(s) 6.4.0-22, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
History

Thu, 31 Jul 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell xtremio X2
Vendors & Products Dell
Dell xtremio X2

Wed, 30 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 18:00:00 +0000

Type Values Removed Values Added
Description Dell XtremIO, version(s) 6.4.0-22, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published: 2025-07-30T17:50:38.998Z

Updated: 2025-07-30T18:05:17.842Z

Reserved: 2025-03-17T05:03:47.268Z

Link: CVE-2025-30105

cve-icon Vulnrichment

Updated: 2025-07-30T18:05:15.311Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-30T18:15:30.690

Modified: 2025-07-31T18:42:37.870

Link: CVE-2025-30105

cve-icon Redhat

No data.