CVE-2025-43891

5.3 MEDIUM

📋 TL;DR

Dell PowerProtect Data Domain systems using vulnerable DD OS versions contain a broken cryptographic algorithm in authentication mechanisms. An unauthenticated remote attacker could exploit this to potentially disclose sensitive information. This affects Data Domain systems running specific Feature Release and LTS versions.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: DD OS Feature Release 7.7.1.0 through 8.3.0.15, LTS2025 8.3.1.0, LTS2024 7.13.1.0 through 7.13.1.30, LTS2023 7.10.1.0 through 7.10.1.60
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All systems running affected DD OS versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of authentication credentials leading to unauthorized access to backup data and system configuration.

🟠

Likely Case

Information disclosure of authentication-related data or system metadata that could aid further attacks.

🟢

If Mitigated

Limited exposure if strong network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation possible, exposing systems directly to internet threats.
🏢 Internal Only: MEDIUM - Internal attackers could exploit, but requires network access to vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of cryptographic weaknesses but no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches per Dell advisory DSA-2025-333

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell advisory DSA-2025-333. 2. Download appropriate patches from Dell support portal. 3. Apply patches following Dell's upgrade procedures. 4. Verify patch application and system functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Data Domain systems to only trusted management networks.

Access Control Lists

all

Implement strict firewall rules to limit connections to Data Domain management interfaces.

🧯 If You Can't Patch

  • Isolate vulnerable systems in dedicated network segments with strict access controls.
  • Implement additional authentication layers and monitor for unusual authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check DD OS version via system CLI: 'version' command or web interface system information.

Check Version:

version

Verify Fix Applied:

Verify DD OS version is updated beyond vulnerable ranges and check Dell patch installation logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Failed cryptographic operations in system logs
  • Unexpected remote connections to authentication services

Network Indicators:

  • Unusual traffic patterns to Data Domain authentication ports
  • Multiple failed authentication attempts from single sources

SIEM Query:

source="data_domain" AND (event_type="auth_failure" OR event_type="crypto_error")

🔗 References

📤 Share & Export