CVE-2025-46676
📋 TL;DR
Dell PowerProtect Data Domain systems running affected DD OS versions contain an information disclosure vulnerability. A high-privileged attacker with remote access could exploit this to access sensitive information. This affects multiple long-term support and feature release versions of the Data Domain Operating System.
💻 Affected Systems
- Dell PowerProtect Data Domain
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
High-privileged attacker gains unauthorized access to sensitive system information, potentially including credentials, configuration data, or other protected information.
Likely Case
Authorized but malicious insider or compromised high-privilege account accesses sensitive information they shouldn't have access to.
If Mitigated
With proper access controls and monitoring, the impact is limited to authorized users accessing information within their legitimate scope.
🎯 Exploit Status
Exploitation requires existing high-privileged remote access. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Dell advisory DSA-2025-415 for specific patched versions
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000405813/dsa-2025-415-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities
Restart Required: Yes
Instructions:
1. Review Dell advisory DSA-2025-415. 2. Download appropriate patch for your DD OS version. 3. Apply patch following Dell's update procedures. 4. Restart system as required. 5. Verify patch application.
🔧 Temporary Workarounds
Restrict High-Privilege Access
allLimit the number of accounts with high privileges and implement strict access controls.
Network Segmentation
allIsolate Data Domain systems from untrusted networks and implement strict firewall rules.
🧯 If You Can't Patch
- Implement strict access controls and least privilege principles for all accounts
- Monitor and audit all high-privilege account activity on affected systems
🔍 How to Verify
Check if Vulnerable:
Check DD OS version using 'version' command in Data Domain CLI and compare against affected versions list.
Check Version:
version (in Data Domain CLI)
Verify Fix Applied:
Verify DD OS version is updated to a version not listed in the affected ranges, or check with Dell support for patch verification.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns by high-privilege accounts
- Access to sensitive information stores by unauthorized users
Network Indicators:
- Unusual remote access patterns to Data Domain systems
SIEM Query:
Search for access to sensitive data stores by high-privilege accounts outside normal patterns