Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43889: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

0
Medium
VulnerabilityCVE-2025-43889cvecve-2025-43889cwe-22
Published: Tue Oct 07 2025 (10/07/2025, 18:37:23 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4, LTS2024 release Versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UI. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.

AI-Powered Analysis

AILast updated: 10/07/2025, 19:00:41 UTC

Technical Analysis

CVE-2025-43889 identifies a path traversal vulnerability (CWE-22) in Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.4, including LTS2024 and LTS2023 releases. The vulnerability resides in the UI component, where improper validation of pathname inputs allows an unauthenticated remote attacker to traverse directories beyond intended restrictions. This can lead to unauthorized exposure of sensitive files stored on the system. The attack vector requires no authentication or user interaction and can be executed remotely over the network. The vulnerability affects multiple versions, indicating a long-standing issue across feature and long-term support releases. While no public exploits have been reported, the potential for information disclosure poses a risk to confidentiality. The CVSS 3.1 base score of 5.3 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, no user interaction, and limited confidentiality impact. The vulnerability does not affect system integrity or availability. Dell has not yet published patches, so mitigation currently relies on access controls and monitoring. Given the critical role of PowerProtect Data Domain in enterprise backup and recovery, exploitation could expose backup data or system configuration files, potentially aiding further attacks.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive backup data or system files, which could include customer data, intellectual property, or configuration details. This exposure could facilitate further attacks such as credential theft or lateral movement within networks. Organizations in finance, healthcare, government, and critical infrastructure sectors are particularly at risk due to the sensitive nature of their backup data. The vulnerability’s unauthenticated remote exploitability increases the attack surface, especially if management interfaces are exposed to untrusted networks. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach could lead to regulatory non-compliance under GDPR and damage organizational reputation. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation warrant proactive mitigation. European entities relying on Dell PowerProtect Data Domain for data protection must consider this vulnerability a significant concern, especially in environments with less restrictive network segmentation.

Mitigation Recommendations

1. Immediately restrict network access to the management interfaces of Dell PowerProtect Data Domain systems using firewalls, VPNs, or network segmentation to prevent exposure to untrusted networks. 2. Monitor logs and network traffic for unusual access patterns or attempts to access unauthorized paths within the UI. 3. Implement strict access control policies limiting who can reach the management UI, ideally restricting to trusted administrative hosts. 4. Regularly audit system configurations and file permissions to detect any unauthorized changes or exposures. 5. Stay in close contact with Dell for official patches or updates addressing CVE-2025-43889 and apply them promptly once available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect path traversal attempts targeting the affected systems. 7. Educate IT and security teams about the vulnerability to ensure rapid response to any suspicious activity. 8. Review backup data encryption and access controls to minimize the impact of any potential data exposure. 9. Conduct penetration testing focusing on path traversal and UI input validation to identify any residual weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e55fc5a677756fc99c5724

Added to database: 10/7/2025, 6:45:25 PM

Last enriched: 10/7/2025, 7:00:41 PM

Last updated: 10/8/2025, 9:59:52 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats