EUVD-2025-18198

| CVE-2025-36573 HIGH
2025-06-12 [email protected]
7.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 21:20 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:20 euvd
EUVD-2025-18198
CVE Published
Jun 12, 2025 - 16:15 nvd
HIGH 7.1

Description

Dell Smart Dock Firmware, versions prior to 01.00.08.01, contain an Insertion of Sensitive Information into Log File vulnerability. A user with local access could potentially exploit this vulnerability, leading to Information disclosure.

Analysis

Dell Smart Dock Firmware versions prior to 01.00.08.01 contain an insertion of sensitive information into log file vulnerability (CWE-532) that allows local attackers without privileges to read confidential data through log file access. This is a moderate-to-high severity information disclosure issue (CVSS 7.1) affecting physical/local access scenarios; while not remotely exploitable, the lack of privilege requirements and cross-system scope impact make this a meaningful risk for shared device environments.

Technical Context

This vulnerability represents a classic CWE-532 (Insertion of Sensitive Information into Log File) flaw where the Dell Smart Dock firmware improperly logs sensitive data (credentials, tokens, configuration details, or PII) in plaintext or insufficiently protected log files. The Smart Dock is a USB-C/Thunderbolt docking station that centralizes connectivity for laptops and desktops. The root cause stems from inadequate data classification during logging operations—developers failed to sanitize or exclude sensitive information before writing to persistent logs. The CVSS vector (AV:L/AC:L/PR:N/UI:N) indicates this requires local file system access but no special privileges, meaning any user account on the dock's management interface or connected system could retrieve logs. The S:C (Scope Changed) rating indicates confidentiality impact extends beyond the vulnerable component to connected systems.

Affected Products

Dell Smart Dock Firmware versions prior to 01.00.08.01. Specific affected models likely include Dell WD19, WD19DC, WD19TB, WD19DCS, and other Smart Dock variants using vulnerable firmware versions. CPE data would follow pattern: cpe:2.3:o:dell:smart_dock_firmware:*:*:*:*:*:*:*:* with version ranges <01.00.08.01. Vendor advisory and patch information should be obtained from Dell's official security advisories (DSA-2025-XXX or similar). Users should cross-reference their specific dock model against Dell's advisory to confirm applicability.

Remediation

Immediate action: Update Dell Smart Dock firmware to version 01.00.08.01 or later. Patch availability: Dell has released firmware version 01.00.08.01 as the fixed version; users should download from Dell's support portal or use Dell's automatic firmware update mechanism (if available) via the docking station management software. Interim mitigations pending patching: (1) Restrict physical/USB access to Smart Dock devices to trusted users only; (2) Disable or secure access to firmware management interfaces if exposed to untrusted local networks; (3) Review existing dock logs for evidence of exposed sensitive data (credentials, API keys, PII) and rotate credentials if compromised; (4) Implement file-level access controls on dock configuration/log storage to prevent unprivileged log access; (5) Segregate dock management traffic on isolated network segments if remote management is enabled. Monitor Dell security advisories for official patch links and compatibility notes.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

EUVD-2025-18198 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy