Dell has released an urgent security advisory (DSA-2025-375) for a critical vulnerability in its Data Lakehouse platform, tracked as CVE-2025-46608. The flaw, rated 9.1 out of 10 on the CVSS v3.1 scale, is an improper access control vulnerability. It could allow a remote attacker who already possesses high-level privileges to escalate them further, leading to a full compromise of the affected system. The vulnerability's impact is considered critical because it can cross security boundaries, affecting resources beyond the vulnerable component itself. Dell strongly recommends customers update to the patched version, Data Lakehouse 1.6.0.0, as a matter of priority.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HPR:H) to exploit it. However, the exploit is low complexity (AC:L), requires no user interaction (UI:N), and can be performed over the network (AV:N). Most importantly, the scope is changed (S:C), meaning a successful exploit can impact resources beyond the security scope of the vulnerable component, leading to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H).There is currently no evidence that CVE-2025-46608 is being exploited in the wild. However, given its critical rating and the detailed information available, security researchers and threat actors may attempt to develop proof-of-concept (PoC) exploits. Organizations should operate under the assumption that exploitation is possible and imminent.
While the prerequisite of high initial privileges might limit the number of potential attackers, the impact of a successful exploit is maximum. An attacker could gain complete control over the Data Lakehouse environment. This platform often stores vast quantities of sensitive business and customer data for analytics purposes. A compromise could lead to a catastrophic data breach, manipulation of critical business intelligence, and complete service disruption. The ability for the exploit to affect adjacent systems (S:C) means a compromised Data Lakehouse could serve as a powerful pivot point for a wider network intrusion.
Vulnerability Scanning.Local Account Monitoring.Network Isolation.Applying the vendor-supplied patch is the most direct way to remediate the vulnerability.
Mapped D3FEND Techniques:
Since the exploit requires high privileges, reducing the number of such accounts and monitoring their usage limits the attack surface.
Restricting network access to the platform's management interfaces can prevent a remote attacker from reaching the vulnerable component.
Mapped D3FEND Techniques:
The definitive countermeasure for CVE-2025-46608 is to upgrade all Dell Data Lakehouse instances to the patched version 1.6.0.0 or newer. Given the critical 9.1 CVSS score, this update should be prioritized as an emergency change. Security teams must first use asset inventory systems to identify all deployments of Dell Data Lakehouse in their environment. The patch should then be deployed following established change management procedures, prioritizing production and internet-facing systems. After deployment, a follow-up vulnerability scan is crucial to verify that all instances have been successfully updated and the vulnerability is fully remediated. No other measure provides the same level of assurance as applying the vendor's official patch.
The exploit for CVE-2025-46608 requires an attacker to already possess high privileges. To mitigate this, organizations must enforce the principle of least privilege on the Dell Data Lakehouse platform. Conduct a thorough audit of all user accounts and service accounts with access to the platform. Revoke any permissions that are not strictly necessary for the account's business function. No user should have standing, persistent high-privilege access. Instead, implement a Privileged Access Management (PAM) solution to grant just-in-time (JIT) administrative access for specific, approved tasks. By reducing the number of high-privilege accounts, you shrink the attack surface and make it significantly harder for an attacker to obtain the prerequisites needed to exploit this vulnerability.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats