CVE-2025-43727

7.5 HIGH

📋 TL;DR

An authentication bypass vulnerability in Dell PowerProtect Data Domain's RestAPI allows unauthenticated remote attackers to gain unauthorized access. This affects Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.1.0.10 and specific LTS releases. Organizations using these vulnerable versions are at risk of unauthorized system access.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: Feature Release: 7.7.1.0 through 8.1.0.10; LTS2024: 7.13.1.0 through 7.13.1.25; LTS 2023: 7.10.1.0 through 7.10.1.50
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with RestAPI enabled and accessible. All default configurations with RestAPI are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to access, modify, or delete protected backup data, potentially leading to data destruction or ransomware deployment.

🟠

Likely Case

Unauthorized access to backup systems allowing data exfiltration, configuration changes, or disruption of backup operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploit allows direct external attacks without credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-303 indicates incorrect authentication algorithm implementation, suggesting straightforward exploitation once understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to versions beyond affected ranges: Feature Release > 8.1.0.10, LTS2024 > 7.13.1.25, LTS 2023 > 7.10.1.50

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-159. 2. Download appropriate patch from Dell support. 3. Apply patch following Dell's upgrade procedures. 4. Restart affected systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Restrict RestAPI Network Access

all

Limit network access to RestAPI endpoints using firewall rules to only trusted management networks.

# Example firewall rule to restrict RestAPI access
# iptables -A INPUT -p tcp --dport [RESTAPI_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
# iptables -A INPUT -p tcp --dport [RESTAPI_PORT] -j DROP

Disable RestAPI if Unused

linux

Temporarily disable RestAPI service if not required for operations.

# Check if RestAPI is enabled
# systemctl status ddrestapi
# Disable RestAPI service
# systemctl stop ddrestapi
# systemctl disable ddrestapi

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Data Domain systems from untrusted networks.
  • Enable detailed logging and monitoring for unauthorized access attempts to RestAPI endpoints.

🔍 How to Verify

Check if Vulnerable:

Check DD OS version using 'ddos version' command and compare against affected version ranges.

Check Version:

ddos version

Verify Fix Applied:

Verify version is updated beyond vulnerable ranges and test authentication requirements for RestAPI endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access without credentials
  • Unusual RestAPI access from unexpected IP addresses
  • Authentication bypass patterns in RestAPI logs

Network Indicators:

  • Unusual traffic patterns to RestAPI ports from external sources
  • Authentication bypass attempts in network traffic

SIEM Query:

source="ddos_logs" AND ("RestAPI" OR "authentication") AND ("bypass" OR "unauthorized" OR status=200 AND auth_failed=true)

🔗 References

📤 Share & Export