Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43890: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

0
Medium
VulnerabilityCVE-2025-43890cvecve-2025-43890cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 17:53:41 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:26:35 UTC

Technical Analysis

CVE-2025-43890 is an OS command injection vulnerability identified in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) across multiple feature and long-term support (LTS) release versions, specifically from 7.7.1.0 through 8.3.0.15, including LTS2025 release 8.3.1.0, LTS2024 releases 7.13.1.0 through 7.13.1.30, and LTS2023 releases 7.10.1.0 through 7.10.1.60. The root cause is improper neutralization of special elements used in OS commands (CWE-78), which allows a high-privileged attacker with local access to inject and execute arbitrary OS commands on the affected system. This can lead to privilege escalation to root, granting full control over the system. The vulnerability does not require user interaction but does require the attacker to have high privileges and local access, limiting remote exploitation. The CVSS v3.1 score of 6.7 reflects a medium severity with high impact on confidentiality, integrity, and availability, but limited attack vector (local). No public exploits or patches are currently reported, emphasizing the need for vigilance and proactive mitigation. The vulnerability threatens the integrity and security of backup and data protection environments relying on Dell PowerProtect Data Domain systems, potentially allowing attackers to compromise backup data or disrupt backup operations.

Potential Impact

The exploitation of CVE-2025-43890 can have severe consequences for organizations using Dell PowerProtect Data Domain systems, which are critical for data backup and recovery. Successful exploitation allows an attacker with existing high privileges and local access to execute arbitrary commands as root, potentially leading to full system compromise. This can result in unauthorized access to sensitive backup data, data tampering, deletion, or disruption of backup services, undermining data integrity and availability. Organizations may face data loss, extended downtime, and compliance violations due to compromised backup environments. Although remote exploitation is not feasible, insider threats or attackers who gain local access through other means pose significant risks. The vulnerability could also be leveraged as a stepping stone for lateral movement within networks, increasing overall organizational risk.

Mitigation Recommendations

Organizations should implement the following specific mitigation strategies: 1) Restrict local access to Dell PowerProtect Data Domain systems strictly to trusted and authorized personnel only, minimizing the risk of local exploitation. 2) Monitor and audit privileged user activities on these systems to detect any suspicious command execution or privilege escalation attempts. 3) Apply principle of least privilege rigorously, ensuring users and processes operate with the minimum necessary privileges. 4) Deploy host-based intrusion detection or prevention systems (HIDS/HIPS) on the affected systems to detect anomalous OS command executions. 5) Stay alert for official patches or updates from Dell addressing this vulnerability and apply them promptly once available. 6) Consider network segmentation to isolate backup systems from general user networks to reduce attack surface. 7) Conduct regular security assessments and penetration tests focusing on local privilege escalation vectors within backup infrastructure. These targeted steps go beyond generic advice by focusing on access control, monitoring, and proactive patch management specific to the affected Dell product environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e55537a677756fc99a7728

Added to database: 10/7/2025, 6:00:23 PM

Last enriched: 2/27/2026, 2:26:35 AM

Last updated: 3/25/2026, 2:57:02 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses