CVE-2025-43913

5.3 MEDIUM

📋 TL;DR

Dell PowerProtect Data Domain systems running affected DD OS versions contain a broken cryptographic algorithm vulnerability. Unauthenticated remote attackers could exploit this to potentially disclose information, which could be leveraged in phishing attacks to obtain sensitive data. This affects Data Domain systems with specific Feature Release and LTS versions.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: DD OS Feature Release 7.7.1.0 through 8.3.0.15, LTS2025 8.3.1.0, LTS2024 7.13.1.0 through 7.13.1.30, LTS2023 7.10.1.0 through 7.10.1.60
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All systems running affected DD OS versions are vulnerable by default. The vulnerability requires remote access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could decrypt sensitive data, intercept communications, or use stolen information to launch targeted phishing campaigns that compromise credentials or other confidential information.

🟠

Likely Case

Information disclosure that could be used for reconnaissance or as part of a broader attack chain, potentially leading to credential harvesting through phishing.

🟢

If Mitigated

Limited impact if systems are isolated, have strong network controls, and users are trained to recognize phishing attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability requires cryptographic analysis and specific conditions to exploit effectively. No public exploits are known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates per Dell advisory DSA-2025-333

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell advisory DSA-2025-333. 2. Download appropriate patches from Dell Support. 3. Apply patches following Dell's deployment guidelines. 4. Verify patch installation and system functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Data Domain systems to only trusted management networks

Access Control

all

Implement strict firewall rules to limit remote access to necessary IP addresses only

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and internet access
  • Implement network monitoring and intrusion detection for suspicious cryptographic activity

🔍 How to Verify

Check if Vulnerable:

Check DD OS version using 'version' command in Data Domain CLI and compare against affected versions

Check Version:

version

Verify Fix Applied:

Verify DD OS version is updated beyond affected ranges and check Dell advisory for specific fixed versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual cryptographic operations
  • Failed authentication attempts
  • Unexpected remote connections

Network Indicators:

  • Suspicious traffic patterns to Data Domain management interfaces
  • Unusual port activity

SIEM Query:

source="data_domain" AND (event_type="crypto_error" OR auth_failure_count>5)

🔗 References

📤 Share & Export