CVE-2025-45375

4.4 MEDIUM

📋 TL;DR

A stack-based buffer overflow vulnerability in Dell PowerProtect Data Domain with DD OS allows high-privileged attackers with local access to cause denial of service. This affects organizations using vulnerable versions of Dell's data protection appliances. The vulnerability requires local access and high privileges to exploit.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: DD OS Feature Release 7.7.1.0 through 8.3.0.15, LTS2025 8.3.1.0, LTS2024 7.13.1.0 through 7.13.1.30, LTS2023 7.10.1.0 through 7.10.1.60
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with local administrative access; standard deployments are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash leading to extended denial of service for backup and recovery operations, potentially causing data protection gaps.

🟠

Likely Case

Local denial of service affecting specific services or processes on the Data Domain system.

🟢

If Mitigated

Minimal impact due to required local access and high privileges, with proper access controls preventing exploitation.

🌐 Internet-Facing: LOW - Requires local access and high privileges, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal attackers with administrative access could disrupt backup operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and high privileges; buffer overflow exploitation requires specific knowledge of the vulnerable component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates per Dell advisory DSA-2025-333

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell advisory DSA-2025-333. 2. Download appropriate patches from Dell Support. 3. Apply patches during maintenance window. 4. Verify patch application using version check.

🔧 Temporary Workarounds

Restrict Local Administrative Access

all

Limit local administrative access to only essential personnel to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict access controls to limit local administrative access to trusted personnel only.
  • Monitor system logs for unusual local administrative activity or denial of service indicators.

🔍 How to Verify

Check if Vulnerable:

Check DD OS version using 'version' command in CLI and compare against affected versions listed in advisory.

Check Version:

version

Verify Fix Applied:

Verify DD OS version is updated beyond affected ranges and check Dell advisory for specific fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • Abnormal process termination
  • Failed authentication attempts with administrative accounts

Network Indicators:

  • None - local exploitation only

SIEM Query:

Search for 'denial of service' or 'system crash' events from Data Domain systems with affected versions.

🔗 References

📤 Share & Export