CVE-2025-43934

6.0 MEDIUM

📋 TL;DR

This path traversal vulnerability in Dell PowerProtect Data Domain allows high-privileged local attackers to access restricted directories, potentially causing denial of service or unauthorized access. It affects multiple DD OS versions across Feature Release, LTS2025, LTS2024, and LTS2023 branches. Only attackers with local access and administrative privileges can exploit this vulnerability.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: DD OS Feature Release 7.7.1.0 through 8.3.0.15, LTS2025 8.3.1.0, LTS2024 7.13.1.0 through 7.13.1.30, LTS2023 7.10.1.0 through 7.10.1.60
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where attackers have local access and high privileges. Not exploitable remotely without prior access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker gains unauthorized access to sensitive system files, modifies critical configurations, or causes complete system unavailability through denial of service.

🟠

Likely Case

Malicious insider or compromised admin account causes service disruption or accesses restricted data they shouldn't have permission to view.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and blocked before causing significant damage.

🌐 Internet-Facing: LOW - Requires local access and high privileges, making remote exploitation unlikely without prior system compromise.
🏢 Internal Only: MEDIUM - Internal attackers with administrative access could exploit this, but requires specific privilege level.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and high privileges, which reduces widespread exploitation risk but increases insider threat potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches specified in Dell Security Advisory DSA-2025-333

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell Security Advisory DSA-2025-333. 2. Download appropriate patches for your DD OS version. 3. Apply patches following Dell's update procedures. 4. Verify patch application success.

🔧 Temporary Workarounds

Restrict Local Administrative Access

all

Limit the number of users with local administrative privileges to reduce attack surface.

Implement Least Privilege Access Controls

all

Ensure users only have necessary permissions for their roles, minimizing potential damage from compromised accounts.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for administrative accounts
  • Segment network to limit exposure and implement additional authentication requirements for administrative access

🔍 How to Verify

Check if Vulnerable:

Check DD OS version using 'ddos version' command and compare against affected version ranges.

Check Version:

ddos version

Verify Fix Applied:

Verify patch application by checking version after update and confirming it's outside affected ranges.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns by privileged users
  • Multiple failed path traversal attempts in system logs
  • Unexpected configuration changes

Network Indicators:

  • Unusual administrative access patterns
  • Multiple authentication attempts from single privileged account

SIEM Query:

source="ddos_logs" AND (event_type="file_access" AND path="../" OR event_type="config_change" AND user="admin")

🔗 References

📤 Share & Export