Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30098: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain Feature Release

0
Medium
VulnerabilityCVE-2025-30098cvecve-2025-30098cwe-78
Published: Mon Aug 04 2025 (08/04/2025, 14:42:36 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.

AI-Powered Analysis

AILast updated: 08/13/2025, 00:51:05 UTC

Technical Analysis

CVE-2025-30098 is an OS command injection vulnerability identified in Dell PowerProtect Data Domain systems running specific versions of the Data Domain Operating System (DD OS), specifically Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release versions 7.13.1.0 through 7.13.1.25, and LTS 2023 release versions 7.10.1.0 through 7.10.1.50. The vulnerability resides in the DDSH CLI (Command Line Interface), where improper neutralization of special elements in OS commands allows a high-privileged attacker with local access to inject arbitrary OS commands. Successful exploitation results in execution of arbitrary commands with root privileges, potentially compromising the confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score is 6.7, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) and no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may require vendor updates or configuration changes. This vulnerability is critical for environments relying on Dell PowerProtect Data Domain for backup and data protection, as root-level compromise can lead to data theft, destruction, or disruption of backup services.

Potential Impact

For European organizations, the impact of CVE-2025-30098 can be significant, especially for enterprises and service providers that use Dell PowerProtect Data Domain systems for critical backup and disaster recovery operations. A successful attack could lead to unauthorized access to sensitive backup data, manipulation or deletion of backups, and disruption of data protection workflows. This could result in data loss, regulatory non-compliance (e.g., GDPR violations), and operational downtime. Given the root-level access gained through exploitation, attackers could also establish persistent footholds or pivot to other parts of the network, increasing the risk of broader compromise. Organizations in sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly at risk due to their reliance on robust data protection and stringent regulatory requirements.

Mitigation Recommendations

1. Restrict local access to Dell PowerProtect Data Domain systems strictly to trusted administrators and monitor for unauthorized access attempts. 2. Implement strong authentication and access controls to limit high-privilege user accounts and regularly audit their usage. 3. Apply the latest patches and firmware updates from Dell as soon as they become available to address this vulnerability. 4. Employ command-line interface usage monitoring and anomaly detection to identify suspicious command injection attempts. 5. Use network segmentation to isolate backup infrastructure from general user networks, reducing the risk of local access by unauthorized users. 6. Conduct regular security assessments and penetration testing focusing on backup systems to detect potential exploitation paths. 7. Maintain comprehensive logging and alerting on the DDSH CLI usage to facilitate rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-03-17T05:03:47.267Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6890cb8ead5a09ad00e1ea0e

Added to database: 8/4/2025, 3:02:38 PM

Last enriched: 8/13/2025, 12:51:05 AM

Last updated: 10/30/2025, 10:33:01 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats