Dell PowerEdge BIOS/ iDRAC9 Info Disclosure (CVE-2025-26482)
CVE-2025-26482 Published on September 25, 2025

Dell PowerEdge Server BIOS and Dell iDRAC9, all versions, contains an Information Disclosure vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information Disclosure.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2025-26482 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Exposure of Sensitive System Information Due to Uncleared Debug Information

The hardware does not fully clear security-sensitive values, such as keys and intermediate values in cryptographic operations, when debug mode is entered.


Products Associated with CVE-2025-26482

Want to know whenever a new CVE is published for Dell Idrac9? stack.watch will email you.

 

Affected Versions

Dell PowerEdge R770: Dell PowerEdge R670: Dell PowerEdge R570: Dell PowerEdge R470: Dell PowerEdge R6715: Dell PowerEdge R7715: Dell PowerEdge R6725: Dell PowerEdge R7725: Dell PowerEdge R660: Dell PowerEdge R760: Dell PowerEdge C6620: Dell PowerEdge MX760c: Dell PowerEdge R860: Dell PowerEdge R960: Dell PowerEdge HS5610: Dell PowerEdge HS5620: Dell PowerEdge R660xs: Dell PowerEdge R760xs: Dell PowerEdge R760xd2: Dell PowerEdge T560: Dell PowerEdge R760xa: Dell PowerEdge XE9680: Dell PowerEdge XE9680L: Dell PowerEdge XR5610: Dell PowerEdge XR8610t: Dell PowerEdge XR8620t: Dell PowerEdge XR7620: Dell PowerEdge XE8640: Dell PowerEdge XE9640: Dell PowerEdge T160: Dell PowerEdge T360: Dell PowerEdge R260: Dell PowerEdge R360: Dell PowerEdge R650: Dell PowerEdge R750: Dell PowerEdge R750XA: Dell PowerEdge C6520: Dell PowerEdge MX750C: Dell PowerEdge R550: Dell PowerEdge R450: Dell PowerEdge R650XS: Dell PowerEdge R750XS: Dell PowerEdge T550: Dell PowerEdge XR11: Dell PowerEdge XR12: Dell PowerEdge XR4510c: Dell PowerEdge XR4520c: Dell PowerEdge T150: Dell PowerEdge T350: Dell PowerEdge R250: Dell PowerEdge R350: Dell PowerEdge R740: Dell PowerEdge R740XD: Dell PowerEdge R640: Dell PowerEdge R940: Dell PowerEdge R540: Dell PowerEdge R440: Dell PowerEdge T440: Dell PowerEdge XR2: Dell PowerEdge R740XD2: Dell PowerEdge R840: Dell PowerEdge R940XA: Dell PowerEdge T640: Dell PowerEdge C6420: Dell PowerEdge FC640: Dell PowerEdge M640: Dell PowerEdge M640 (for PE VRTX): Dell PowerEdge MX740C: Dell PowerEdge MX840C: Dell PowerEdge C4140: Dell DSS 8440: Dell PowerEdge XE2420: Dell PowerEdge XE7420: Dell PowerEdge XE7440: Dell PowerEdge T140: Dell PowerEdge T340: Dell PowerEdge R240: Dell PowerEdge R340: Dell EMC Storage NX3240: Dell EMC Storage NX3340: Dell EMC NX440: Dell XC Core XC660: Dell XC Core XC760: Dell XC Core XC660xs: Dell XC Core XC760xa: Dell EMC XC Core XC450: Dell EMC XC Core XC650: Dell EMC XC Core XC750: Dell EMC XC Core XC750xa: Dell EMC XC Core XC6520: Dell EMC XC Core 6420 System: Dell EMC XC Core XC640 System: Dell EMC XC Core XC740xd System: Dell EMC XC Core XC740xd2: Dell EMC XC Core XC940 System: Dell EMC XC Core XCXR2: Dell PowerEdge R6615: Dell PowerEdge R7615: Dell PowerEdge R6625: Dell PowerEdge R7625: Dell PowerEdge C6615: Dell PowerEdge R6515: Dell PowerEdge R6525: Dell PowerEdge R7515: Dell PowerEdge R7525: Dell PowerEdge C6525: Dell PowerEdge XE8545: Dell EMC XC Core XC7525: Dell XC Core XC7625: Dell PowerEdge R6415: Dell PowerEdge R7415: Dell PowerEdge R7425: Dell iDRAC9: Dell iDRAC9:

Exploit Probability

EPSS
0.04%
Percentile
12.02%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.