Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36566: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

0
Medium
VulnerabilityCVE-2025-36566cvecve-2025-36566cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 19:44:11 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:48:05 UTC

Technical Analysis

CVE-2025-36566 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), specifically an OS command injection flaw found in Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.1.0.10, including LTS2024 and LTS2023 releases. The vulnerability allows a high-privileged local attacker to inject malicious commands into the operating system due to insufficient sanitization of special characters or elements in command inputs. This improper neutralization enables arbitrary command execution with the privileges of the compromised process, which can lead to privilege escalation to root. The attack vector requires local access and high privileges, with no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to execute arbitrary commands, potentially compromising sensitive data, altering system configurations, or disrupting services. Although no public exploits have been reported, the medium CVSS score of 6.7 reflects the significant risk posed by this vulnerability in environments where attackers can gain or already have elevated local access. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The vulnerability poses a serious risk to organizations relying on Dell PowerProtect Data Domain systems for data backup and storage, as successful exploitation can lead to full system compromise. Attackers with high privileges and local access could execute arbitrary commands, potentially leading to unauthorized data access, data corruption, or disruption of backup services. Privilege escalation to root could allow attackers to bypass security controls, install persistent malware, or pivot to other parts of the network. This could result in data breaches, loss of data integrity, and significant operational downtime. Given the critical role of data protection appliances in enterprise environments, exploitation could severely impact business continuity and regulatory compliance. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where insider threats or compromised credentials exist.

Mitigation Recommendations

Organizations should immediately restrict local access to Dell PowerProtect Data Domain systems to trusted administrators only, employing strict access controls and monitoring. Implement robust logging and alerting to detect unusual command executions or privilege escalations. Until patches are released, consider isolating affected systems from less trusted network segments to reduce attack surface. Conduct regular audits of user privileges and remove unnecessary high-privilege accounts. Employ application whitelisting or command filtering where possible to prevent execution of unauthorized commands. Stay informed on Dell’s security advisories for timely patch availability and apply updates promptly once released. Additionally, perform thorough incident response readiness to quickly address any signs of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-15T21:29:33.584Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e57159a677756fc9a082fb

Added to database: 10/7/2025, 8:00:25 PM

Last enriched: 2/27/2026, 1:48:05 AM

Last updated: 3/26/2026, 11:12:42 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses