CVE-2025-30098

6.7 MEDIUM

📋 TL;DR

This vulnerability allows a high-privileged attacker with local access to execute arbitrary OS commands with root privileges on Dell PowerProtect Data Domain systems. It affects systems running specific versions of Data Domain Operating System (DD OS). Attackers could gain complete control of affected systems.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain with Data Domain Operating System (DD OS)
Versions: Feature Release 7.7.1.0 through 8.1.0.10, LTS2024 7.13.1.0 through 7.13.1.25, LTS2023 7.10.1.0 through 7.10.1.50
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high-privileged local access to DDSH CLI. Not exploitable remotely without local access first.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, allowing data theft, system destruction, or lateral movement to other systems.

🟠

Likely Case

Privilege escalation from high-privileged local user to root, enabling unauthorized administrative actions on the system.

🟢

If Mitigated

Limited impact if proper access controls restrict local high-privileged users and network segmentation is implemented.

🌐 Internet-Facing: LOW - Requires local access, not directly exploitable over network.
🏢 Internal Only: HIGH - High-privileged insiders or compromised accounts with local access can exploit this for full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires high-privileged local access and knowledge of command injection techniques. No public exploit available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to versions beyond affected ranges. Check Dell advisory for specific fixed versions.

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell advisory DSA-2025-159. 2. Download appropriate patch for your DD OS version. 3. Apply patch following Dell's update procedures. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to high-privileged accounts and implement strict access controls.

🧯 If You Can't Patch

  • Implement strict access controls to limit local high-privileged users
  • Monitor for suspicious command execution and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check DD OS version using 'ddos version' command and compare against affected ranges.

Check Version:

ddos version

Verify Fix Applied:

Verify DD OS version is updated beyond affected ranges using 'ddos version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in DDSH CLI logs
  • Privilege escalation attempts
  • Suspicious root-level commands

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Search for command injection patterns in system logs, particularly DDSH CLI activity with special characters or unexpected commands.

🔗 References

📤 Share & Export