CVE-2025-36594: CWE-290: Authentication Bypass by Spoofing in Dell PowerProtect Data Domain Feature Release
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.
AI Analysis
Technical Summary
CVE-2025-36594 is an authentication bypass vulnerability classified under CWE-290, discovered in Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) versions from 7.7.1.0 through 8.3.0.15, including LTS2023 and LTS2024 releases. The vulnerability arises from improper validation of authentication credentials, allowing an unauthenticated remote attacker to spoof authentication and bypass protection mechanisms. This flaw enables the attacker to create unauthorized user accounts on the system, which can lead to unauthorized access to sensitive customer data, manipulation or corruption of backup data, and disruption of system availability. The vulnerability does not require any prior privileges or user interaction, and can be exploited remotely over the network. The CVSS v3.1 base score is 9.8, reflecting the critical nature of the vulnerability with high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the ease of exploitation and the criticality of the affected systems make this a significant threat. Dell has not yet published patches or mitigation instructions at the time of this report, increasing the urgency for organizations to monitor updates and apply fixes promptly once available.
Potential Impact
The impact of CVE-2025-36594 is severe for organizations using Dell PowerProtect Data Domain systems, which are widely deployed for enterprise backup and data protection. Successful exploitation can lead to unauthorized creation of accounts, exposing sensitive customer information and potentially allowing attackers to manipulate or delete backup data. This compromises data integrity and availability, undermining trust in backup systems and potentially causing significant operational disruption and data loss. The breach of backup environments can also facilitate further lateral movement within networks, increasing the risk of broader compromise. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks of regulatory penalties and reputational damage. The remote, unauthenticated nature of the exploit increases the attack surface, making it accessible to a wide range of threat actors, including cybercriminals and nation-state adversaries.
Mitigation Recommendations
Given the critical severity and lack of currently available patches, organizations should immediately implement compensating controls to reduce exposure. These include restricting network access to Dell PowerProtect Data Domain management interfaces to trusted IP addresses only, employing network segmentation and firewall rules to limit remote access, and monitoring logs for unusual account creation or authentication attempts. Enabling multi-factor authentication (MFA) where possible can add an additional layer of defense. Organizations should prioritize applying official patches or updates from Dell as soon as they are released. Regularly auditing user accounts and permissions on affected systems can help detect unauthorized changes early. Additionally, maintaining offline and immutable backups can mitigate the impact of potential data tampering. Coordination with Dell support and threat intelligence sharing communities is recommended to stay informed about exploit developments and remediation guidance.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Singapore
CVE-2025-36594: CWE-290: Authentication Bypass by Spoofing in Dell PowerProtect Data Domain Feature Release
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36594 is an authentication bypass vulnerability classified under CWE-290, discovered in Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) versions from 7.7.1.0 through 8.3.0.15, including LTS2023 and LTS2024 releases. The vulnerability arises from improper validation of authentication credentials, allowing an unauthenticated remote attacker to spoof authentication and bypass protection mechanisms. This flaw enables the attacker to create unauthorized user accounts on the system, which can lead to unauthorized access to sensitive customer data, manipulation or corruption of backup data, and disruption of system availability. The vulnerability does not require any prior privileges or user interaction, and can be exploited remotely over the network. The CVSS v3.1 base score is 9.8, reflecting the critical nature of the vulnerability with high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the ease of exploitation and the criticality of the affected systems make this a significant threat. Dell has not yet published patches or mitigation instructions at the time of this report, increasing the urgency for organizations to monitor updates and apply fixes promptly once available.
Potential Impact
The impact of CVE-2025-36594 is severe for organizations using Dell PowerProtect Data Domain systems, which are widely deployed for enterprise backup and data protection. Successful exploitation can lead to unauthorized creation of accounts, exposing sensitive customer information and potentially allowing attackers to manipulate or delete backup data. This compromises data integrity and availability, undermining trust in backup systems and potentially causing significant operational disruption and data loss. The breach of backup environments can also facilitate further lateral movement within networks, increasing the risk of broader compromise. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks of regulatory penalties and reputational damage. The remote, unauthenticated nature of the exploit increases the attack surface, making it accessible to a wide range of threat actors, including cybercriminals and nation-state adversaries.
Mitigation Recommendations
Given the critical severity and lack of currently available patches, organizations should immediately implement compensating controls to reduce exposure. These include restricting network access to Dell PowerProtect Data Domain management interfaces to trusted IP addresses only, employing network segmentation and firewall rules to limit remote access, and monitoring logs for unusual account creation or authentication attempts. Enabling multi-factor authentication (MFA) where possible can add an additional layer of defense. Organizations should prioritize applying official patches or updates from Dell as soon as they are released. Regularly auditing user accounts and permissions on affected systems can help detect unauthorized changes early. Additionally, maintaining offline and immutable backups can mitigate the impact of potential data tampering. Coordination with Dell support and threat intelligence sharing communities is recommended to stay informed about exploit developments and remediation guidance.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- dell
- Date Reserved
- 2025-04-15T21:32:11.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6890c80aad5a09ad00e1d6d0
Added to database: 8/4/2025, 2:47:38 PM
Last enriched: 2/27/2026, 1:48:57 AM
Last updated: 3/24/2026, 4:01:20 AM
Views: 126
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.