Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30097: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain Feature Release

0
Medium
VulnerabilityCVE-2025-30097cvecve-2025-30097cwe-78
Published: Mon Aug 04 2025 (08/04/2025, 14:38:04 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:27:40 UTC

Technical Analysis

CVE-2025-30097 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), commonly known as OS command injection. It affects Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) Feature Release versions from 7.7.1.0 through 8.1.0.10, as well as LTS2024 and LTS2023 releases within specified version ranges. The vulnerability resides in the DDSH CLI, a command-line interface used for system management. Due to improper sanitization of input, a high-privileged attacker with local access can inject malicious OS commands, which are executed with root-level privileges. This can lead to full system compromise, including unauthorized data access, modification, or destruction, and potentially pivoting to other network assets. The CVSS v3.1 score of 6.7 reflects a medium severity rating, with attack vector local (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches were linked at the time of reporting, and no active exploitation has been observed in the wild. The vulnerability underscores the importance of secure input validation in CLI tools, especially those running with elevated privileges in critical backup and storage infrastructure.

Potential Impact

If exploited, this vulnerability allows a high-privileged local attacker to execute arbitrary commands as root, leading to complete system compromise. This can result in unauthorized access to sensitive backup data, data corruption or deletion, disruption of backup services, and potential lateral movement within the network. Organizations relying on Dell PowerProtect Data Domain for data protection and storage could face data loss, operational downtime, and regulatory compliance violations. The impact extends to confidentiality, integrity, and availability of critical backup infrastructure. Given the root-level access gained, attackers could also implant persistent backdoors or disrupt recovery capabilities, severely affecting disaster recovery plans. Although exploitation requires local access and high privileges, insider threats or attackers who have already compromised administrative accounts pose a significant risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed and weaponized in the future.

Mitigation Recommendations

Organizations should immediately review and restrict local administrative access to Dell PowerProtect Data Domain systems, ensuring only trusted personnel have high-privilege accounts. Implement strict access controls and monitoring on the DDSH CLI usage to detect anomalous command executions. Apply principle of least privilege to limit the number of users with root-level access. Monitor system logs for suspicious activity indicative of command injection attempts. Dell should be contacted for official patches or updates addressing this vulnerability; once available, promptly apply them to affected systems. In the interim, consider disabling or restricting access to the vulnerable DDSH CLI functionality if feasible. Conduct regular security audits and vulnerability assessments on backup infrastructure. Employ network segmentation to isolate backup appliances from general user networks, reducing the risk of local access by unauthorized users. Maintain up-to-date backups and test recovery procedures to mitigate potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-03-17T05:03:47.267Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6890c80aad5a09ad00e1d6cd

Added to database: 8/4/2025, 2:47:38 PM

Last enriched: 2/27/2026, 1:27:40 AM

Last updated: 3/21/2026, 5:00:16 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses