Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43891: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

0
Medium
VulnerabilityCVE-2025-43891cvecve-2025-43891cwe-327
Published: Tue Oct 07 2025 (10/07/2025, 18:43:06 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an use of a Broken or Risky Cryptographic Algorithm vulnerability in the Authentication. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.

AI-Powered Analysis

AILast updated: 10/07/2025, 19:15:53 UTC

Technical Analysis

CVE-2025-43891 identifies a cryptographic vulnerability in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) across multiple feature and long-term support (LTS) release versions, specifically from 7.7.1.0 through 8.3.0.15 and several LTS releases up to 7.13.1.30 and 7.10.1.60. The vulnerability is classified under CWE-327, indicating the use of a broken or risky cryptographic algorithm within the authentication mechanism of the product. This cryptographic weakness could allow an unauthenticated remote attacker to exploit the system, potentially leading to unauthorized information disclosure. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts confidentiality only, without affecting integrity or availability. The vulnerability does not currently have known exploits in the wild, but the affected product is a widely deployed enterprise backup and data protection appliance, making it a valuable target for attackers seeking sensitive data. The lack of patches at the time of reporting necessitates immediate attention to cryptographic configurations and monitoring. The vulnerability's presence in authentication processes suggests that the cryptographic algorithm used may be susceptible to cryptanalysis or downgrade attacks, undermining the trustworthiness of authentication tokens or sessions. Organizations relying on these systems for critical data backup and recovery must assess exposure and prepare for remediation once patches are released.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality of sensitive backup data managed by Dell PowerProtect Data Domain systems. Since these systems are integral to data protection and disaster recovery strategies, any information disclosure could lead to leakage of proprietary, personal, or regulated data, potentially violating GDPR and other data protection regulations. The unauthenticated remote exploitation capability increases the attack surface, especially for organizations exposing these systems to less secure network segments or the internet. While integrity and availability are not directly impacted, the loss of confidentiality could facilitate further attacks or espionage. Industries such as finance, healthcare, telecommunications, and government agencies in Europe that heavily rely on Dell's data protection solutions are particularly vulnerable. The medium severity rating suggests a moderate but non-trivial risk, warranting prompt mitigation to avoid escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Monitor Dell's official security advisories closely for patches addressing CVE-2025-43891 and apply them promptly once available. 2. In the interim, review and harden cryptographic configurations on affected DD OS systems, disabling any deprecated or weak algorithms if configurable. 3. Restrict network access to PowerProtect Data Domain appliances by implementing strict firewall rules and network segmentation, limiting exposure to trusted management networks only. 4. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous authentication attempts or suspicious traffic targeting these systems. 5. Conduct regular audits of backup data access logs to detect potential unauthorized information access. 6. Engage with Dell support to understand any recommended temporary workarounds or mitigations. 7. Incorporate this vulnerability into risk assessments and incident response plans, ensuring readiness to respond to potential exploitation attempts. 8. Educate IT and security teams about the cryptographic nature of the vulnerability to ensure appropriate technical scrutiny during remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-18T05:05:05.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e56349a677756fc99d1121

Added to database: 10/7/2025, 7:00:25 PM

Last enriched: 10/7/2025, 7:15:53 PM

Last updated: 10/9/2025, 3:03:05 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats