CVE-2025-36566: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root.
AI Analysis
Technical Summary
CVE-2025-36566 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), specifically an OS command injection flaw found in Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.1.0.10, including LTS2024 and LTS2023 releases. The vulnerability allows a high-privileged local attacker to inject malicious commands into the operating system due to insufficient sanitization of special characters or elements in command inputs. This improper neutralization enables arbitrary command execution with the privileges of the compromised process, which can lead to privilege escalation to root. The attack vector requires local access and high privileges, with no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to execute arbitrary commands, potentially compromising sensitive data, altering system configurations, or disrupting services. Although no public exploits have been reported, the medium CVSS score of 6.7 reflects the significant risk posed by this vulnerability in environments where attackers can gain or already have elevated local access. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
The vulnerability poses a serious risk to organizations relying on Dell PowerProtect Data Domain systems for data backup and storage, as successful exploitation can lead to full system compromise. Attackers with high privileges and local access could execute arbitrary commands, potentially leading to unauthorized data access, data corruption, or disruption of backup services. Privilege escalation to root could allow attackers to bypass security controls, install persistent malware, or pivot to other parts of the network. This could result in data breaches, loss of data integrity, and significant operational downtime. Given the critical role of data protection appliances in enterprise environments, exploitation could severely impact business continuity and regulatory compliance. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where insider threats or compromised credentials exist.
Mitigation Recommendations
Organizations should immediately restrict local access to Dell PowerProtect Data Domain systems to trusted administrators only, employing strict access controls and monitoring. Implement robust logging and alerting to detect unusual command executions or privilege escalations. Until patches are released, consider isolating affected systems from less trusted network segments to reduce attack surface. Conduct regular audits of user privileges and remove unnecessary high-privilege accounts. Employ application whitelisting or command filtering where possible to prevent execution of unauthorized commands. Stay informed on Dell’s security advisories for timely patch availability and apply updates promptly once released. Additionally, perform thorough incident response readiness to quickly address any signs of exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Singapore
CVE-2025-36566: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36566 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), specifically an OS command injection flaw found in Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.1.0.10, including LTS2024 and LTS2023 releases. The vulnerability allows a high-privileged local attacker to inject malicious commands into the operating system due to insufficient sanitization of special characters or elements in command inputs. This improper neutralization enables arbitrary command execution with the privileges of the compromised process, which can lead to privilege escalation to root. The attack vector requires local access and high privileges, with no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to execute arbitrary commands, potentially compromising sensitive data, altering system configurations, or disrupting services. Although no public exploits have been reported, the medium CVSS score of 6.7 reflects the significant risk posed by this vulnerability in environments where attackers can gain or already have elevated local access. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
The vulnerability poses a serious risk to organizations relying on Dell PowerProtect Data Domain systems for data backup and storage, as successful exploitation can lead to full system compromise. Attackers with high privileges and local access could execute arbitrary commands, potentially leading to unauthorized data access, data corruption, or disruption of backup services. Privilege escalation to root could allow attackers to bypass security controls, install persistent malware, or pivot to other parts of the network. This could result in data breaches, loss of data integrity, and significant operational downtime. Given the critical role of data protection appliances in enterprise environments, exploitation could severely impact business continuity and regulatory compliance. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where insider threats or compromised credentials exist.
Mitigation Recommendations
Organizations should immediately restrict local access to Dell PowerProtect Data Domain systems to trusted administrators only, employing strict access controls and monitoring. Implement robust logging and alerting to detect unusual command executions or privilege escalations. Until patches are released, consider isolating affected systems from less trusted network segments to reduce attack surface. Conduct regular audits of user privileges and remove unnecessary high-privilege accounts. Employ application whitelisting or command filtering where possible to prevent execution of unauthorized commands. Stay informed on Dell’s security advisories for timely patch availability and apply updates promptly once released. Additionally, perform thorough incident response readiness to quickly address any signs of exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- dell
- Date Reserved
- 2025-04-15T21:29:33.584Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e57159a677756fc9a082fb
Added to database: 10/7/2025, 8:00:25 PM
Last enriched: 2/27/2026, 1:48:05 AM
Last updated: 3/26/2026, 11:12:42 AM
Views: 124
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.