Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43914: CWE-266: Incorrect Privilege Assignment in Dell PowerProtect Data Domain BoostFS for Linux Ubuntu Feature Release

0
High
VulnerabilityCVE-2025-43914cvecve-2025-43914cwe-266
Published: Tue Oct 07 2025 (10/07/2025, 17:43:48 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain BoostFS for Linux Ubuntu Feature Release

Description

Dell PowerProtect Data Domain BoostFS for Linux Ubuntu systems of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.

AI-Powered Analysis

AILast updated: 10/07/2025, 18:15:41 UTC

Technical Analysis

CVE-2025-43914 is an Incorrect Privilege Assignment vulnerability (CWE-266) found in Dell PowerProtect Data Domain BoostFS for Linux Ubuntu Feature Release versions 7.7.1.0 through 8.3.0.15, including multiple LTS releases (LTS2025, LTS2024, LTS2023). The vulnerability allows a low-privileged attacker with local access to escalate privileges improperly due to misconfigured permissions within the BoostFS component. This can lead to unauthorized access, potentially compromising confidentiality, integrity, and availability of the system and stored data. The attack requires local access and user interaction, and has a high attack complexity, indicating it is not trivially exploitable remotely but can be leveraged by insiders or through compromised accounts. The vulnerability affects critical backup and storage infrastructure, which is often integral to enterprise data protection strategies. Although no public exploits are known at this time, the high CVSS score (7.5) and the critical nature of the affected systems underscore the importance of timely remediation. The vulnerability was published on October 7, 2025, with Dell as the assigner. No patches are currently linked, suggesting that organizations should monitor Dell advisories closely for updates. The vulnerability’s scope is 'changed' (S:C), meaning exploitation can affect resources beyond the initially vulnerable component, increasing risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data backup and recovery environments that rely on Dell PowerProtect Data Domain BoostFS on Linux Ubuntu systems. Successful exploitation could allow attackers to gain unauthorized access and potentially manipulate or exfiltrate sensitive backup data, undermining data integrity and availability. This could disrupt business continuity, lead to data loss, or facilitate further lateral movement within networks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened risks due to the potential exposure of sensitive or regulated data. The requirement for local access limits remote exploitation but increases the threat from insider attacks or compromised internal accounts. The high attack complexity reduces the likelihood of widespread automated attacks but does not eliminate targeted exploitation risks. The absence of known exploits currently provides a window for proactive defense, but the critical nature of backup systems demands urgent attention.

Mitigation Recommendations

1. Monitor Dell’s official security advisories for patches addressing CVE-2025-43914 and apply them promptly once available. 2. Restrict local access to systems running affected versions of PowerProtect Data Domain BoostFS to trusted personnel only, employing strict access controls and multi-factor authentication for local logins. 3. Implement robust monitoring and alerting for unusual privilege escalations or access patterns on affected systems, including audit logging of BoostFS operations. 4. Conduct regular security reviews and hardening of Linux Ubuntu systems hosting BoostFS, ensuring minimal necessary privileges are assigned to users and processes. 5. Use endpoint detection and response (EDR) tools to detect potential exploitation attempts or suspicious local activity. 6. Educate internal staff about the risks of privilege escalation vulnerabilities and enforce least privilege principles. 7. Consider network segmentation to isolate backup infrastructure from general user environments to reduce insider threat exposure. 8. Prepare incident response plans specifically addressing potential compromise of backup systems to minimize impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-19T05:03:41.170Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e55537a677756fc99a772b

Added to database: 10/7/2025, 6:00:23 PM

Last enriched: 10/7/2025, 6:15:41 PM

Last updated: 10/9/2025, 10:58:23 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats