Impact
A process control flaw exists in Dell Integrated Dell Remote Access Controller firmware versions before 7.00.00.181 for iDRAC 9/14G, 7.20.10.50 for iDRAC 15G/16G, and 1.20.25.00 for iDRAC 10/17G. Key detail from vendor description: a high‑privileged attacker with adjacent network access could exploit this vulnerability, leading to code execution. The weakness is identified as CWE‑114 (Process Control).
Affected Systems
Affected systems are Dell iDRAC firmware versions: iDRAC 9/14G prior to 7.00.00.181; iDRAC 15G/16G prior to 7.20.10.50; iDRAC 10/17G prior to 1.20.25.00. Users of any of these firmware releases are potentially vulnerable.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity. EPSS data is not available and the vulnerability is not listed in CISA’s KEV catalog, suggesting it has not been actively exploited publicly yet. Based on the description, the likely attack vector requires the attacker to have high privilege on the same network as the iDRAC, implying the need for close network proximity or credential compromise. The vulnerability permits remote code execution if exploited, which could allow an attacker to take control of the server through the iDRAC interface.
OpenCVE Enrichment