Dell Encryption <11.12.1 Link Following Priv Esc Vulnerability
CVE-2025-46637 Published on December 9, 2025
Dell Encryption, versions prior to 11.12.1, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A local malicious user could potentially exploit this vulnerability, leading to Elevation of privileges.
Vulnerability Analysis
CVE-2025-46637 can be exploited with local system access, requires user interaction and a small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is an insecure temporary file Vulnerability?
The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
CVE-2025-46637 has been classified to as an insecure temporary file vulnerability or weakness.
Products Associated with CVE-2025-46637
Want to know whenever a new CVE is published for Dell Encryption? stack.watch will email you.
Affected Versions
Dell Encryption:- Before 11.12.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.