Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36566: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

0
Medium
VulnerabilityCVE-2025-36566cvecve-2025-36566cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 19:44:11 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

Description

CVE-2025-36566 is an OS command injection vulnerability affecting Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions 7. 7. 1. 0 through 8. 1. 0. 10 and certain LTS releases. A high-privileged attacker with local access can exploit this flaw to execute arbitrary OS commands, potentially escalating privileges to root. The vulnerability arises from improper neutralization of special elements in OS commands (CWE-78). It does not require user interaction but does require high privileges and local access.

AI-Powered Analysis

AILast updated: 10/15/2025, 01:11:33 UTC

Technical Analysis

CVE-2025-36566 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), affecting Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.1.0.10, including LTS2024 and LTS2023 releases. The flaw allows a high-privileged attacker with local access to inject arbitrary OS commands due to insufficient sanitization of special characters or elements in command inputs. This can lead to arbitrary command execution on the underlying operating system, enabling privilege escalation to root. The vulnerability requires the attacker to already have high privileges and local access, which limits remote exploitation but increases risk from insider threats or compromised administrative accounts. The CVSS v3.1 score of 6.7 reflects medium severity, with attack vector local (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits or patches are currently available, though the vulnerability has been officially published and reserved since April 2025. The affected product is widely used in enterprise backup and data protection environments, making this vulnerability significant for organizations relying on Dell DD OS for data integrity and availability.

Potential Impact

For European organizations, the impact of CVE-2025-36566 can be substantial, particularly for those using Dell PowerProtect Data Domain systems as critical backup and storage infrastructure. Successful exploitation could allow attackers with local high privileges to execute arbitrary commands, potentially leading to full system compromise, data corruption, or deletion, and disruption of backup services. This threatens data confidentiality, integrity, and availability, which are vital for compliance with regulations such as GDPR. Insider threats or attackers who gain administrative access could leverage this vulnerability to escalate privileges and move laterally within networks. The disruption or compromise of backup systems could severely impact business continuity and disaster recovery capabilities. Given the medium severity but high impact on core security properties, organizations must prioritize mitigation to prevent potential data loss or operational downtime.

Mitigation Recommendations

1. Apply official patches or updates from Dell as soon as they become available to address this vulnerability. 2. Restrict local access to Dell PowerProtect Data Domain systems strictly to trusted administrators and use strong authentication mechanisms such as multi-factor authentication. 3. Implement strict access control policies and monitor privileged user activities to detect any anomalous behavior indicative of exploitation attempts. 4. Employ host-based intrusion detection systems (HIDS) and endpoint protection to identify suspicious command execution or privilege escalation activities. 5. Regularly audit and review system logs for unusual command usage or access patterns. 6. Consider network segmentation to isolate backup systems from general user networks to reduce the risk of local access by unauthorized users. 7. Educate administrators on the risks of privilege misuse and enforce the principle of least privilege. 8. Prepare incident response plans specifically addressing potential compromise of backup infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-15T21:29:33.584Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e57159a677756fc9a082fb

Added to database: 10/7/2025, 8:00:25 PM

Last enriched: 10/15/2025, 1:11:33 AM

Last updated: 11/20/2025, 7:36:42 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats