Skip to main content

CVE-2025-36594: CWE-290: Authentication Bypass by Spoofing in Dell PowerProtect Data Domain Feature Release

Critical
VulnerabilityCVE-2025-36594cvecve-2025-36594cwe-290
Published: Mon Aug 04 2025 (08/04/2025, 14:25:56 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.

AI-Powered Analysis

AILast updated: 08/04/2025, 15:02:43 UTC

Technical Analysis

CVE-2025-36594 is a critical authentication bypass vulnerability affecting Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) versions from Feature Release 7.7.1.0 through 8.3.0.15, as well as LTS2024 and LTS2023 releases within specified version ranges. The vulnerability is classified under CWE-290, indicating an authentication bypass by spoofing. An unauthenticated remote attacker with network access to the affected system can exploit this flaw to bypass authentication mechanisms entirely. This allows the attacker to create unauthorized accounts on the system, potentially exposing sensitive customer information, compromising system integrity, and impacting availability. The vulnerability has a CVSS v3.1 base score of 9.8 (critical), reflecting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation (no privileges or user interaction required). Although no known exploits are currently reported in the wild, the severity and nature of the flaw make it a significant risk. The lack of available patches at the time of publication further increases exposure. The vulnerability undermines the core protection mechanisms of Dell PowerProtect Data Domain, a widely used enterprise backup and data protection solution, potentially allowing attackers to manipulate backup data, exfiltrate sensitive information, or disrupt backup operations critical for business continuity.

Potential Impact

For European organizations, the impact of this vulnerability is substantial due to the widespread use of Dell PowerProtect Data Domain in enterprise backup infrastructures across sectors such as finance, healthcare, government, and critical infrastructure. Exploitation could lead to unauthorized access to backup repositories containing sensitive personal and corporate data, violating GDPR and other data protection regulations, resulting in legal and financial penalties. Integrity compromise could allow attackers to alter or delete backup data, undermining disaster recovery capabilities and potentially causing prolonged downtime. Availability impacts could disrupt backup and restore operations, affecting business continuity and operational resilience. Given the criticality of backup systems in maintaining data integrity and availability, this vulnerability poses a direct threat to the security posture and regulatory compliance of affected organizations in Europe.

Mitigation Recommendations

Immediate mitigation steps include restricting network access to Dell PowerProtect Data Domain systems to trusted management networks only, employing network segmentation and strict firewall rules to limit exposure. Organizations should implement multi-factor authentication and monitor for anomalous account creation or access patterns. Since no patches are currently available, deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect suspicious authentication bypass attempts is advisable. Regularly auditing system logs for unauthorized access attempts and account creations can help early detection. Organizations should engage with Dell support for updates on patch availability and apply security updates promptly once released. Additionally, implementing compensating controls such as enhanced monitoring, strict access controls, and incident response readiness will reduce risk until a permanent fix is deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-15T21:32:11.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6890c80aad5a09ad00e1d6d0

Added to database: 8/4/2025, 2:47:38 PM

Last enriched: 8/4/2025, 3:02:43 PM

Last updated: 8/4/2025, 3:47:38 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats