CVE-2025-36594: CWE-290: Authentication Bypass by Spoofing in Dell PowerProtect Data Domain Feature Release
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.
AI Analysis
Technical Summary
CVE-2025-36594 is a critical authentication bypass vulnerability affecting Dell PowerProtect Data Domain systems running specific versions of the Data Domain Operating System (DD OS), specifically Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 releases 7.13.1.0 through 7.13.1.25, and LTS2023 releases 7.10.1.0 through 7.10.1.60. The vulnerability is categorized under CWE-290, which relates to authentication bypass by spoofing. An unauthenticated remote attacker can exploit this flaw without any user interaction or prior privileges. Exploitation allows the attacker to bypass protection mechanisms, create unauthorized accounts, and potentially gain access to sensitive customer information. This can severely compromise system integrity and availability, as the attacker could manipulate or disrupt backup and data protection processes managed by PowerProtect Data Domain appliances. The CVSS v3.1 base score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of remote exploitation without authentication or user interaction. No public exploits are currently known in the wild, but the severity and nature of the vulnerability make it a high-risk issue for organizations relying on these systems for data backup and protection.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the widespread use of Dell PowerProtect Data Domain appliances in enterprise backup and disaster recovery environments. Successful exploitation could lead to unauthorized access to backup data, exposing sensitive personal and corporate information protected under GDPR and other privacy regulations. Integrity of backup data could be compromised, leading to potential data corruption or loss, which would disrupt business continuity and recovery efforts. Availability could also be affected if attackers disable or manipulate backup services, increasing downtime and operational risk. Given the critical role of data protection systems, this vulnerability poses a direct threat to compliance, operational resilience, and trustworthiness of IT infrastructure in sectors such as finance, healthcare, government, and critical infrastructure across Europe.
Mitigation Recommendations
Organizations should immediately identify and inventory affected Dell PowerProtect Data Domain systems running vulnerable DD OS versions. Since no patches are currently linked, it is crucial to engage Dell support for any available security updates or workarounds. In the interim, restrict remote access to management interfaces of affected systems using network segmentation, firewalls, and VPNs to limit exposure to untrusted networks. Implement strict monitoring and logging of authentication attempts and account creations on these appliances to detect suspicious activities early. Employ multi-factor authentication (MFA) where supported to add an additional layer of security. Regularly review and audit user accounts and permissions on the affected systems. Additionally, ensure that backup data is encrypted at rest and in transit to mitigate data exposure risks. Prepare incident response plans specifically addressing potential compromise of backup infrastructure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36594: CWE-290: Authentication Bypass by Spoofing in Dell PowerProtect Data Domain Feature Release
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-36594 is a critical authentication bypass vulnerability affecting Dell PowerProtect Data Domain systems running specific versions of the Data Domain Operating System (DD OS), specifically Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 releases 7.13.1.0 through 7.13.1.25, and LTS2023 releases 7.10.1.0 through 7.10.1.60. The vulnerability is categorized under CWE-290, which relates to authentication bypass by spoofing. An unauthenticated remote attacker can exploit this flaw without any user interaction or prior privileges. Exploitation allows the attacker to bypass protection mechanisms, create unauthorized accounts, and potentially gain access to sensitive customer information. This can severely compromise system integrity and availability, as the attacker could manipulate or disrupt backup and data protection processes managed by PowerProtect Data Domain appliances. The CVSS v3.1 base score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of remote exploitation without authentication or user interaction. No public exploits are currently known in the wild, but the severity and nature of the vulnerability make it a high-risk issue for organizations relying on these systems for data backup and protection.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the widespread use of Dell PowerProtect Data Domain appliances in enterprise backup and disaster recovery environments. Successful exploitation could lead to unauthorized access to backup data, exposing sensitive personal and corporate information protected under GDPR and other privacy regulations. Integrity of backup data could be compromised, leading to potential data corruption or loss, which would disrupt business continuity and recovery efforts. Availability could also be affected if attackers disable or manipulate backup services, increasing downtime and operational risk. Given the critical role of data protection systems, this vulnerability poses a direct threat to compliance, operational resilience, and trustworthiness of IT infrastructure in sectors such as finance, healthcare, government, and critical infrastructure across Europe.
Mitigation Recommendations
Organizations should immediately identify and inventory affected Dell PowerProtect Data Domain systems running vulnerable DD OS versions. Since no patches are currently linked, it is crucial to engage Dell support for any available security updates or workarounds. In the interim, restrict remote access to management interfaces of affected systems using network segmentation, firewalls, and VPNs to limit exposure to untrusted networks. Implement strict monitoring and logging of authentication attempts and account creations on these appliances to detect suspicious activities early. Employ multi-factor authentication (MFA) where supported to add an additional layer of security. Regularly review and audit user accounts and permissions on the affected systems. Additionally, ensure that backup data is encrypted at rest and in transit to mitigate data exposure risks. Prepare incident response plans specifically addressing potential compromise of backup infrastructure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- dell
- Date Reserved
- 2025-04-15T21:32:11.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6890c80aad5a09ad00e1d6d0
Added to database: 8/4/2025, 2:47:38 PM
Last enriched: 8/13/2025, 12:51:42 AM
Last updated: 9/13/2025, 11:06:24 AM
Views: 35
Related Threats
CVE-2025-10429: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10440: OS Command Injection in D-Link DI-8100
MediumCVE-2025-10428: Unrestricted Upload in SourceCodester Pet Grooming Management Software
MediumCVE-2025-59328: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Fory
MediumCVE-2025-10436: SQL Injection in Campcodes Computer Sales and Inventory System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.