Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2025-20103 CVE-2025-20054 CVE-2024-45332 |
CWE-ID | CWE-399 CWE-248 CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Dell XC Core XC760xa Hardware solutions / Firmware Dell XC Core XC660xs Hardware solutions / Firmware Dell XC Core XC760 Hardware solutions / Firmware Dell XC Core XC660 Hardware solutions / Firmware PowerEdge XE9640 Hardware solutions / Firmware PowerEdge XE8640 Hardware solutions / Firmware PowerEdge XR7620 Hardware solutions / Firmware PowerEdge XR8620t Hardware solutions / Firmware PowerEdge XR8610t Hardware solutions / Firmware PowerEdge XR5610 Hardware solutions / Firmware PowerEdge XE9680 Hardware solutions / Firmware PowerEdge R760xa Hardware solutions / Firmware PowerEdge T560 Hardware solutions / Firmware PowerEdge R760xd2 Hardware solutions / Firmware PowerEdge R760xs Hardware solutions / Firmware PowerEdge R660xs Hardware solutions / Firmware PowerEdge HS5620 Hardware solutions / Firmware PowerEdge HS5610 Hardware solutions / Firmware PowerEdge R960 Hardware solutions / Firmware PowerEdge R860 Hardware solutions / Firmware PowerEdge MX760c Hardware solutions / Firmware PowerEdge C6620 Hardware solutions / Firmware PowerEdge R760 Hardware solutions / Firmware PowerEdge R660 Hardware solutions / Firmware PowerEdge R360 Hardware solutions / Firmware PowerEdge R260 Hardware solutions / Firmware PowerEdge T360 Hardware solutions / Firmware PowerEdge T160 Hardware solutions / Firmware Dell EMC XC Core XCXR2 Hardware solutions / Firmware Dell EMC XC Core XC940 System Hardware solutions / Firmware Dell EMC XC Core XC740xd2 Hardware solutions / Firmware Dell EMC XC Core XC740xd System Hardware solutions / Firmware Dell EMC XC Core XC640 System Hardware solutions / Firmware Dell EMC XC Core 6420 System Hardware solutions / Firmware Dell XC Core XC4520C Hardware solutions / Firmware Dell XC Core XC4510C Hardware solutions / Firmware Dell EMC XC Core XC6520 Hardware solutions / Firmware Dell EMC XC Core XC750xa Hardware solutions / Firmware Dell EMC XC Core XC750 Hardware solutions / Firmware Dell EMC XC Core XC650 Hardware solutions / Firmware Dell EMC XC Core XC450 Hardware solutions / Firmware Dell EMC NX440 Hardware solutions / Firmware Dell EMC Storage NX3340 Hardware solutions / Firmware Dell EMC Storage NX3240 Hardware solutions / Firmware PowerEdge R340 Hardware solutions / Firmware PowerEdge R240 Hardware solutions / Firmware PowerEdge T340 Hardware solutions / Firmware PowerEdge T140 Hardware solutions / Firmware PowerEdge XE7440 Hardware solutions / Firmware PowerEdge XE7420 Hardware solutions / Firmware PowerEdge XE2420 Hardware solutions / Firmware DSS 8440 Hardware solutions / Firmware PowerEdge C4140 Hardware solutions / Firmware PowerEdge MX840C Hardware solutions / Firmware PowerEdge MX740C Hardware solutions / Firmware PowerEdge M640 (for PE VRTX) Hardware solutions / Firmware PowerEdge M640 Hardware solutions / Firmware PowerEdge FC640 Hardware solutions / Firmware PowerEdge C6420 Hardware solutions / Firmware PowerEdge T640 Hardware solutions / Firmware PowerEdge R940XA Hardware solutions / Firmware PowerEdge R840 Hardware solutions / Firmware PowerEdge R740XD2 Hardware solutions / Firmware PowerEdge XR2 Hardware solutions / Firmware PowerEdge T440 Hardware solutions / Firmware PowerEdge R440 Hardware solutions / Firmware PowerEdge R540 Hardware solutions / Firmware PowerEdge R940 Hardware solutions / Firmware PowerEdge R640 Hardware solutions / Firmware PowerEdge R740XD Hardware solutions / Firmware PowerEdge R740 Hardware solutions / Firmware PowerEdge R350 Hardware solutions / Firmware PowerEdge R250 Hardware solutions / Firmware PowerEdge T350 Hardware solutions / Firmware PowerEdge T150 Hardware solutions / Firmware PowerEdge XR4520c Hardware solutions / Firmware PowerEdge XR4510c Hardware solutions / Firmware PowerEdge XR12 Hardware solutions / Firmware PowerEdge XR11 Hardware solutions / Firmware PowerEdge T550 Hardware solutions / Firmware PowerEdge R750XS Hardware solutions / Firmware PowerEdge R650XS Hardware solutions / Firmware PowerEdge R450 Hardware solutions / Firmware PowerEdge R550 Hardware solutions / Firmware PowerEdge MX750c Hardware solutions / Firmware PowerEdge C6520 Hardware solutions / Firmware PowerEdge R750XA Hardware solutions / Firmware PowerEdge R750 Hardware solutions / Firmware PowerEdge R650 Hardware solutions / Firmware |
Vendor | Dell |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU109426
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-20103
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient resource pool in the core management mechanism for some Intel Processors. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website
Vulnerable software versionsDell XC Core XC760xa: before 2.6.3
Dell XC Core XC660xs: before 2.6.3
Dell XC Core XC760: before 2.6.3
Dell XC Core XC660: before 2.6.3
PowerEdge XE9640: before 2.6.3
PowerEdge XE8640: before 2.6.3
PowerEdge XR7620: before 2.6.3
PowerEdge XR8620t: before 2.6.3
PowerEdge XR8610t: before 2.6.3
PowerEdge XR5610: before 2.6.3
PowerEdge XE9680: before 2.6.3
PowerEdge R760xa: before 2.6.3
PowerEdge T560: before 2.6.3
PowerEdge R760xd2: before 2.6.3
PowerEdge R760xs: before 2.6.3
PowerEdge R660xs: before 2.6.3
PowerEdge HS5620: before 2.6.3
PowerEdge HS5610: before 2.6.3
PowerEdge R960: before 2.6.3
PowerEdge R860: before 2.6.3
PowerEdge MX760c: before 2.6.3
PowerEdge C6620: before 2.6.3
PowerEdge R760: before 2.6.3
PowerEdge R660: before 2.6.3
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109427
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-20054
CWE-ID:
CWE-248 - Uncaught Exception
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an uncaught exception in the core management mechanism for some Intel Processors. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website
Vulnerable software versionsDell XC Core XC760xa: before 2.6.3
Dell XC Core XC660xs: before 2.6.3
Dell XC Core XC760: before 2.6.3
Dell XC Core XC660: before 2.6.3
PowerEdge R360: before 2.1.1
PowerEdge R260: before 2.1.1
PowerEdge T360: before 2.1.1
PowerEdge T160: before 2.1.1
PowerEdge XE9640: before 2.6.3
PowerEdge XE8640: before 2.6.3
PowerEdge XR7620: before 2.6.3
PowerEdge XR8620t: before 2.6.3
PowerEdge XR8610t: before 2.6.3
PowerEdge XR5610: before 2.6.3
PowerEdge XE9680: before 2.6.3
PowerEdge R760xa: before 2.6.3
PowerEdge T560: before 2.6.3
PowerEdge R760xd2: before 2.6.3
PowerEdge R760xs: before 2.6.3
PowerEdge R660xs: before 2.6.3
PowerEdge HS5620: before 2.6.3
PowerEdge HS5610: before 2.6.3
PowerEdge R960: before 2.6.3
PowerEdge R860: before 2.6.3
PowerEdge MX760c: before 2.6.3
PowerEdge C6620: before 2.6.3
PowerEdge R760: before 2.6.3
PowerEdge R660: before 2.6.3
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109425
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45332
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to shared microarchitectural predictor state that influences transient execution. A local user can gain access to sensitive information.
MitigationInstall updates from vendor's website
Vulnerable software versionsDell EMC XC Core XCXR2: before 2.24.0
Dell EMC XC Core XC940 System: before 2.24.0
Dell EMC XC Core XC740xd2: before 2.24.0
Dell EMC XC Core XC740xd System: before 2.24.0
Dell EMC XC Core XC640 System: before 2.24.0
Dell EMC XC Core 6420 System: before 2.24.0
Dell XC Core XC4520C: before 1.18.2
Dell XC Core XC4510C: before 1.18.2
Dell EMC XC Core XC6520: before 1.17.2
Dell EMC XC Core XC750xa: before 1.17.2
Dell EMC XC Core XC750: before 1.17.2
Dell EMC XC Core XC650: before 1.17.2
Dell EMC XC Core XC450: before 1.17.2
Dell XC Core XC760xa: before 2.6.3
Dell XC Core XC660xs: before 2.6.3
Dell XC Core XC760: before 2.6.3
Dell XC Core XC660: before 2.6.3
Dell EMC NX440: before 2.19.0
Dell EMC Storage NX3340: before 2.24.0
Dell EMC Storage NX3240: before 2.24.0
PowerEdge R340: before 2.19.0
PowerEdge R240: before 2.19.0
PowerEdge T340: before 2.19.0
PowerEdge T140: before 2.19.0
PowerEdge XE7440: before 2.24.0
PowerEdge XE7420: before 2.24.0
PowerEdge XE2420: before 2.24.0
DSS 8440: before 2.24.0
PowerEdge C4140: before 2.24.0
PowerEdge MX840C: before 2.24.0
PowerEdge MX740C: before 2.24.0
PowerEdge M640 (for PE VRTX): before 2.24.0
PowerEdge M640: before 2.24.0
PowerEdge FC640: before 2.24.0
PowerEdge C6420: before 2.24.0
PowerEdge T640: before 2.24.0
PowerEdge R940XA: before 2.24.0
PowerEdge R840: before 2.24.0
PowerEdge R740XD2: before 2.24.0
PowerEdge XR2: before 2.24.0
PowerEdge T440: before 2.24.0
PowerEdge R440: before 2.24.0
PowerEdge R540: before 2.24.0
PowerEdge R940: before 2.24.0
PowerEdge R640: before 2.24.0
PowerEdge R740XD: before 2.24.0
PowerEdge R740: before 2.24.0
PowerEdge R350: before 1.12.0
PowerEdge R250: before 1.12.0
PowerEdge T350: before 1.12.0
PowerEdge T150: before 1.12.0
PowerEdge XR4520c: before 1.18.2
PowerEdge XR4510c: before 1.18.2
PowerEdge XR12: before 1.17.1
PowerEdge XR11: before 1.17.1
PowerEdge T550: before 1.17.2
PowerEdge R750XS: before 1.17.2
PowerEdge R650XS: before 1.17.2
PowerEdge R450: before 1.17.2
PowerEdge R550: before 1.17.2
PowerEdge MX750c: before 1.17.2
PowerEdge C6520: before 1.17.2
PowerEdge R750XA: before 1.17.2
PowerEdge R750: before 1.17.2
PowerEdge R650: before 1.17.2
PowerEdge R360: before 2.1.1
PowerEdge R260: before 2.1.1
PowerEdge T360: before 2.1.1
PowerEdge T160: before 2.1.1
PowerEdge XE9640: before 2.6.3
PowerEdge XE8640: before 2.6.3
PowerEdge XR7620: before 2.6.3
PowerEdge XR8620t: before 2.6.3
PowerEdge XR8610t: before 2.6.3
PowerEdge XR5610: before 2.6.3
PowerEdge XE9680: before 2.6.3
PowerEdge R760xa: before 2.6.3
PowerEdge T560: before 2.6.3
PowerEdge R760xd2: before 2.6.3
PowerEdge R760xs: before 2.6.3
PowerEdge R660xs: before 2.6.3
PowerEdge HS5620: before 2.6.3
PowerEdge HS5610: before 2.6.3
PowerEdge R960: before 2.6.3
PowerEdge R860: before 2.6.3
PowerEdge MX760c: before 2.6.3
PowerEdge C6620: before 2.6.3
PowerEdge R760: before 2.6.3
PowerEdge R660: before 2.6.3
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.