CVE-2025-43913: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
AI Analysis
Technical Summary
CVE-2025-43913 identifies a cryptographic weakness in Dell PowerProtect Data Domain systems running specific versions of the Data Domain Operating System (DD OS). The vulnerability stems from the use of a broken or risky cryptographic algorithm (CWE-327), which undermines the confidentiality of protected data. An unauthenticated attacker with remote network access can exploit this flaw, but exploitation requires user interaction, such as responding to phishing attempts that leverage the disclosed information. The vulnerability affects multiple versions, including feature releases 7.7.1.0 through 8.3.0.15 and LTS releases 7.10.1.x, 7.13.1.x, and 8.3.1.0. While the vulnerability does not allow direct system compromise or denial of service, it enables attackers to obtain sensitive information, potentially facilitating social engineering or phishing campaigns. The CVSS v3.1 base score of 5.3 reflects a medium severity with network attack vector, high attack complexity, no privileges required, and user interaction needed. No patches or exploits are currently documented, but the risk remains significant due to the critical role of Data Domain systems in enterprise backup and data protection environments.
Potential Impact
For European organizations, the vulnerability poses a confidentiality risk to sensitive backup data managed by Dell PowerProtect Data Domain systems. Disclosure of cryptographic weaknesses could allow attackers to intercept or infer sensitive information, undermining data protection guarantees. This may lead to increased phishing attacks targeting employees or administrators, potentially resulting in credential theft or further compromise. While system integrity and availability are not directly impacted, the loss of confidentiality can have regulatory and reputational consequences, especially under GDPR and other data protection laws. Organizations relying heavily on Dell Data Domain for backup and disaster recovery may face increased risk exposure until mitigations or patches are applied. The medium severity suggests a moderate but non-trivial threat that should be addressed promptly to avoid escalation.
Mitigation Recommendations
1. Monitor Dell’s official security advisories for patches addressing CVE-2025-43913 and apply them promptly once available. 2. Until patches are released, restrict remote network access to Data Domain systems using network segmentation and firewall rules to limit exposure. 3. Implement strict email filtering and user awareness training to reduce the risk of phishing attacks leveraging disclosed information. 4. Enable and enforce multi-factor authentication (MFA) for administrative access to Data Domain systems to mitigate unauthorized access risks. 5. Conduct regular cryptographic audits of backup systems to identify and replace weak algorithms proactively. 6. Employ network intrusion detection systems (NIDS) to detect anomalous traffic patterns indicative of exploitation attempts. 7. Maintain comprehensive logging and monitoring on Data Domain devices to quickly identify suspicious activity. 8. Coordinate with Dell support for guidance on interim mitigations or configuration changes that reduce cryptographic risk.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-43913: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-43913 identifies a cryptographic weakness in Dell PowerProtect Data Domain systems running specific versions of the Data Domain Operating System (DD OS). The vulnerability stems from the use of a broken or risky cryptographic algorithm (CWE-327), which undermines the confidentiality of protected data. An unauthenticated attacker with remote network access can exploit this flaw, but exploitation requires user interaction, such as responding to phishing attempts that leverage the disclosed information. The vulnerability affects multiple versions, including feature releases 7.7.1.0 through 8.3.0.15 and LTS releases 7.10.1.x, 7.13.1.x, and 8.3.1.0. While the vulnerability does not allow direct system compromise or denial of service, it enables attackers to obtain sensitive information, potentially facilitating social engineering or phishing campaigns. The CVSS v3.1 base score of 5.3 reflects a medium severity with network attack vector, high attack complexity, no privileges required, and user interaction needed. No patches or exploits are currently documented, but the risk remains significant due to the critical role of Data Domain systems in enterprise backup and data protection environments.
Potential Impact
For European organizations, the vulnerability poses a confidentiality risk to sensitive backup data managed by Dell PowerProtect Data Domain systems. Disclosure of cryptographic weaknesses could allow attackers to intercept or infer sensitive information, undermining data protection guarantees. This may lead to increased phishing attacks targeting employees or administrators, potentially resulting in credential theft or further compromise. While system integrity and availability are not directly impacted, the loss of confidentiality can have regulatory and reputational consequences, especially under GDPR and other data protection laws. Organizations relying heavily on Dell Data Domain for backup and disaster recovery may face increased risk exposure until mitigations or patches are applied. The medium severity suggests a moderate but non-trivial threat that should be addressed promptly to avoid escalation.
Mitigation Recommendations
1. Monitor Dell’s official security advisories for patches addressing CVE-2025-43913 and apply them promptly once available. 2. Until patches are released, restrict remote network access to Data Domain systems using network segmentation and firewall rules to limit exposure. 3. Implement strict email filtering and user awareness training to reduce the risk of phishing attacks leveraging disclosed information. 4. Enable and enforce multi-factor authentication (MFA) for administrative access to Data Domain systems to mitigate unauthorized access risks. 5. Conduct regular cryptographic audits of backup systems to identify and replace weak algorithms proactively. 6. Employ network intrusion detection systems (NIDS) to detect anomalous traffic patterns indicative of exploitation attempts. 7. Maintain comprehensive logging and monitoring on Data Domain devices to quickly identify suspicious activity. 8. Coordinate with Dell support for guidance on interim mitigations or configuration changes that reduce cryptographic risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- dell
- Date Reserved
- 2025-04-19T05:03:41.170Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e56349a677756fc99d111c
Added to database: 10/7/2025, 7:00:25 PM
Last enriched: 10/7/2025, 7:16:03 PM
Last updated: 10/8/2025, 7:27:57 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11491: OS Command Injection in wonderwhy-er DesktopCommanderMCP
MediumCVE-2025-61524: n/a
UnknownCVE-2025-57457: n/a
UnknownCVE-2025-11490: OS Command Injection in wonderwhy-er DesktopCommanderMCP
MediumCVE-2025-11489: Symlink Following in wonderwhy-er DesktopCommanderMCP
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.