CVE-2025-43908

6.4 MEDIUM

📋 TL;DR

This CVE describes an OS command injection vulnerability in Dell PowerProtect Data Domain systems. A high-privileged attacker with local access can execute arbitrary commands with root privileges. Affected systems include Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.3.0.15 and specific LTS releases.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: DD OS Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS2023 release versions 7.10.1.0 through 7.10.1.60
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high-privileged local access to exploit. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level command execution, allowing data theft, system destruction, or lateral movement within the network.

🟠

Likely Case

Privilege escalation from high-privileged local user to root, enabling unauthorized administrative actions on the Data Domain system.

🟢

If Mitigated

Limited impact due to restricted local access controls and network segmentation preventing attacker access to vulnerable systems.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable over network.
🏢 Internal Only: HIGH - High-privileged internal attackers or compromised accounts can achieve root access on critical backup infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires high-privileged local access. No public exploit code is available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches as specified in Dell Security Advisory DSA-2025-333

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell Security Advisory DSA-2025-333. 2. Download appropriate patches from Dell Support. 3. Apply patches following Dell's documented procedures. 4. Verify patch application and system functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to Data Domain systems to only authorized administrative personnel

Implement Least Privilege

all

Review and reduce local user privileges to minimum required for operations

🧯 If You Can't Patch

  • Implement strict access controls to limit local access to only essential administrative users
  • Monitor for suspicious local command execution and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check DD OS version using 'ddos version' command and compare against affected versions list

Check Version:

ddos version

Verify Fix Applied:

Verify patch application through Dell management interface or by confirming version is no longer in affected range

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns by local users
  • Privilege escalation attempts
  • Unexpected root-level commands

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Search for command injection patterns in Data Domain system logs, focusing on local user activity and privilege changes

🔗 References

📤 Share & Export