Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43913: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

0
Medium
VulnerabilityCVE-2025-43913cvecve-2025-43913cwe-327
Published: Tue Oct 07 2025 (10/07/2025, 18:54:46 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.

AI-Powered Analysis

AILast updated: 10/07/2025, 19:16:03 UTC

Technical Analysis

CVE-2025-43913 identifies a cryptographic weakness in Dell PowerProtect Data Domain systems running specific versions of the Data Domain Operating System (DD OS). The vulnerability stems from the use of a broken or risky cryptographic algorithm (CWE-327), which undermines the confidentiality of protected data. An unauthenticated attacker with remote network access can exploit this flaw, but exploitation requires user interaction, such as responding to phishing attempts that leverage the disclosed information. The vulnerability affects multiple versions, including feature releases 7.7.1.0 through 8.3.0.15 and LTS releases 7.10.1.x, 7.13.1.x, and 8.3.1.0. While the vulnerability does not allow direct system compromise or denial of service, it enables attackers to obtain sensitive information, potentially facilitating social engineering or phishing campaigns. The CVSS v3.1 base score of 5.3 reflects a medium severity with network attack vector, high attack complexity, no privileges required, and user interaction needed. No patches or exploits are currently documented, but the risk remains significant due to the critical role of Data Domain systems in enterprise backup and data protection environments.

Potential Impact

For European organizations, the vulnerability poses a confidentiality risk to sensitive backup data managed by Dell PowerProtect Data Domain systems. Disclosure of cryptographic weaknesses could allow attackers to intercept or infer sensitive information, undermining data protection guarantees. This may lead to increased phishing attacks targeting employees or administrators, potentially resulting in credential theft or further compromise. While system integrity and availability are not directly impacted, the loss of confidentiality can have regulatory and reputational consequences, especially under GDPR and other data protection laws. Organizations relying heavily on Dell Data Domain for backup and disaster recovery may face increased risk exposure until mitigations or patches are applied. The medium severity suggests a moderate but non-trivial threat that should be addressed promptly to avoid escalation.

Mitigation Recommendations

1. Monitor Dell’s official security advisories for patches addressing CVE-2025-43913 and apply them promptly once available. 2. Until patches are released, restrict remote network access to Data Domain systems using network segmentation and firewall rules to limit exposure. 3. Implement strict email filtering and user awareness training to reduce the risk of phishing attacks leveraging disclosed information. 4. Enable and enforce multi-factor authentication (MFA) for administrative access to Data Domain systems to mitigate unauthorized access risks. 5. Conduct regular cryptographic audits of backup systems to identify and replace weak algorithms proactively. 6. Employ network intrusion detection systems (NIDS) to detect anomalous traffic patterns indicative of exploitation attempts. 7. Maintain comprehensive logging and monitoring on Data Domain devices to quickly identify suspicious activity. 8. Coordinate with Dell support for guidance on interim mitigations or configuration changes that reduce cryptographic risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-19T05:03:41.170Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e56349a677756fc99d111c

Added to database: 10/7/2025, 7:00:25 PM

Last enriched: 10/7/2025, 7:16:03 PM

Last updated: 10/8/2025, 7:27:57 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats