CVE-2025-30097: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain Feature Release
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges
AI Analysis
Technical Summary
CVE-2025-30097 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), commonly known as OS command injection. It affects Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) Feature Release versions from 7.7.1.0 through 8.1.0.10, as well as LTS2024 and LTS2023 releases within specified version ranges. The vulnerability resides in the DDSH CLI, a command-line interface used for system management. Due to improper sanitization of input, a high-privileged attacker with local access can inject malicious OS commands, which are executed with root-level privileges. This can lead to full system compromise, including unauthorized data access, modification, or destruction, and potentially pivoting to other network assets. The CVSS v3.1 score of 6.7 reflects a medium severity rating, with attack vector local (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches were linked at the time of reporting, and no active exploitation has been observed in the wild. The vulnerability underscores the importance of secure input validation in CLI tools, especially those running with elevated privileges in critical backup and storage infrastructure.
Potential Impact
If exploited, this vulnerability allows a high-privileged local attacker to execute arbitrary commands as root, leading to complete system compromise. This can result in unauthorized access to sensitive backup data, data corruption or deletion, disruption of backup services, and potential lateral movement within the network. Organizations relying on Dell PowerProtect Data Domain for data protection and storage could face data loss, operational downtime, and regulatory compliance violations. The impact extends to confidentiality, integrity, and availability of critical backup infrastructure. Given the root-level access gained, attackers could also implant persistent backdoors or disrupt recovery capabilities, severely affecting disaster recovery plans. Although exploitation requires local access and high privileges, insider threats or attackers who have already compromised administrative accounts pose a significant risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed and weaponized in the future.
Mitigation Recommendations
Organizations should immediately review and restrict local administrative access to Dell PowerProtect Data Domain systems, ensuring only trusted personnel have high-privilege accounts. Implement strict access controls and monitoring on the DDSH CLI usage to detect anomalous command executions. Apply principle of least privilege to limit the number of users with root-level access. Monitor system logs for suspicious activity indicative of command injection attempts. Dell should be contacted for official patches or updates addressing this vulnerability; once available, promptly apply them to affected systems. In the interim, consider disabling or restricting access to the vulnerable DDSH CLI functionality if feasible. Conduct regular security audits and vulnerability assessments on backup infrastructure. Employ network segmentation to isolate backup appliances from general user networks, reducing the risk of local access by unauthorized users. Maintain up-to-date backups and test recovery procedures to mitigate potential damage from exploitation.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Australia, Canada, Netherlands, South Korea, Singapore
CVE-2025-30097: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain Feature Release
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-30097 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), commonly known as OS command injection. It affects Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) Feature Release versions from 7.7.1.0 through 8.1.0.10, as well as LTS2024 and LTS2023 releases within specified version ranges. The vulnerability resides in the DDSH CLI, a command-line interface used for system management. Due to improper sanitization of input, a high-privileged attacker with local access can inject malicious OS commands, which are executed with root-level privileges. This can lead to full system compromise, including unauthorized data access, modification, or destruction, and potentially pivoting to other network assets. The CVSS v3.1 score of 6.7 reflects a medium severity rating, with attack vector local (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches were linked at the time of reporting, and no active exploitation has been observed in the wild. The vulnerability underscores the importance of secure input validation in CLI tools, especially those running with elevated privileges in critical backup and storage infrastructure.
Potential Impact
If exploited, this vulnerability allows a high-privileged local attacker to execute arbitrary commands as root, leading to complete system compromise. This can result in unauthorized access to sensitive backup data, data corruption or deletion, disruption of backup services, and potential lateral movement within the network. Organizations relying on Dell PowerProtect Data Domain for data protection and storage could face data loss, operational downtime, and regulatory compliance violations. The impact extends to confidentiality, integrity, and availability of critical backup infrastructure. Given the root-level access gained, attackers could also implant persistent backdoors or disrupt recovery capabilities, severely affecting disaster recovery plans. Although exploitation requires local access and high privileges, insider threats or attackers who have already compromised administrative accounts pose a significant risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed and weaponized in the future.
Mitigation Recommendations
Organizations should immediately review and restrict local administrative access to Dell PowerProtect Data Domain systems, ensuring only trusted personnel have high-privilege accounts. Implement strict access controls and monitoring on the DDSH CLI usage to detect anomalous command executions. Apply principle of least privilege to limit the number of users with root-level access. Monitor system logs for suspicious activity indicative of command injection attempts. Dell should be contacted for official patches or updates addressing this vulnerability; once available, promptly apply them to affected systems. In the interim, consider disabling or restricting access to the vulnerable DDSH CLI functionality if feasible. Conduct regular security audits and vulnerability assessments on backup infrastructure. Employ network segmentation to isolate backup appliances from general user networks, reducing the risk of local access by unauthorized users. Maintain up-to-date backups and test recovery procedures to mitigate potential damage from exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- dell
- Date Reserved
- 2025-03-17T05:03:47.267Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6890c80aad5a09ad00e1d6cd
Added to database: 8/4/2025, 2:47:38 PM
Last enriched: 2/27/2026, 1:27:40 AM
Last updated: 3/21/2026, 5:00:16 AM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.