{"vulnerability": "CVE-2025-22398", "sightings": [{"uuid": "41b9faef-e0ca-4e34-bad1-e04f8cef8851", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llnfieiut222", "content": "", "creation_timestamp": "2025-03-31T03:17:39.102971Z"}, {"uuid": "66f4f848-5b70-4b1c-9a73-dcbbe7ad5e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llnpponydh2k", "content": "", "creation_timestamp": "2025-03-31T06:20:41.211380Z"}, {"uuid": "8795dd62-509a-4073-a3b9-0cb37d019871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llpacjsw7c22", "content": "", "creation_timestamp": "2025-03-31T20:50:17.004981Z"}, {"uuid": "40b5c8d0-afcb-47bf-b7d0-5b071e930f42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llnuqeojo22z", "content": "", "creation_timestamp": "2025-03-31T07:50:32.363972Z"}, {"uuid": "49b9e95a-71b3-4e66-80c9-5c85704aa452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "Telegram/JL2AEDUW3nn7wJMvX5Y1pZ6RRzjZ9DRWcg7AcNic7FT7f9E", "content": "", "creation_timestamp": "2025-03-28T04:03:38.000000Z"}, {"uuid": "be7cc031-8858-497a-88fe-bca035bcca81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llfrywabgk2u", "content": "", "creation_timestamp": "2025-03-28T02:40:20.324258Z"}, {"uuid": "eb8dabe3-d5df-4c2b-80b8-ec1e7cd184e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3llghymhkxv27", "content": "", "creation_timestamp": "2025-03-28T09:13:52.722662Z"}, {"uuid": "4dae6170-0cac-4671-9811-2a454dbccec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:47:57.000000Z"}, {"uuid": "04e73dc0-e425-4584-ac81-c2bd62791426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:44.000000Z"}, {"uuid": "eca2af58-12c1-487d-92a5-c183017fd65c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://t.me/cvedetector/21371", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22398 - \"Dell Unity OS Command Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-22398 \nPublished : March 28, 2025, 2:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it can be leveraged to completely compromise the operating system. Dell recommends customers to upgrade at the earliest opportunity. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T05:12:24.000000Z"}, {"uuid": "01211273-e6d3-4ad1-a322-4877b77ddad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22398", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22398\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it can be leveraged to completely compromise the operating system. Dell recommends customers to upgrade at the earliest opportunity.\n\ud83d\udccf Published: 2025-03-28T01:41:00.767Z\n\ud83d\udccf Modified: 2025-03-28T01:41:00.767Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-03-28T02:28:14.000000Z"}]}