Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43914: CWE-266: Incorrect Privilege Assignment in Dell PowerProtect Data Domain BoostFS for Linux Ubuntu Feature Release

0
High
VulnerabilityCVE-2025-43914cvecve-2025-43914cwe-266
Published: Tue Oct 07 2025 (10/07/2025, 17:43:48 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain BoostFS for Linux Ubuntu Feature Release

Description

Dell PowerProtect Data Domain BoostFS for Linux Ubuntu systems of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:27:36 UTC

Technical Analysis

CVE-2025-43914 is an Incorrect Privilege Assignment vulnerability (CWE-266) affecting Dell PowerProtect Data Domain BoostFS for Linux Ubuntu Feature Release versions 7.7.1.0 through 8.3.0.15, including LTS2025, LTS2024, and LTS2023 releases. This vulnerability arises from improper configuration or enforcement of privilege levels within the BoostFS component, which is used for data backup and storage optimization on Linux Ubuntu systems. A low-privileged attacker with local access and requiring user interaction can exploit this flaw to escalate privileges or gain unauthorized access to sensitive data or system functions. The CVSS v3.1 score is 7.5, reflecting high severity due to the potential for complete compromise of confidentiality, integrity, and availability. The attack vector is local (AV:L), attack complexity is high (AC:H), privileges required are low (PR:L), and user interaction is required (UI:R). The scope is changed (S:C), indicating that exploitation affects resources beyond the initially vulnerable component. Although no exploits are currently known in the wild, the vulnerability represents a significant risk to environments relying on Dell PowerProtect Data Domain BoostFS for critical data protection and backup operations. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The vulnerability allows a low-privileged local attacker to escalate privileges or gain unauthorized access to sensitive data and system functions within Dell PowerProtect Data Domain BoostFS environments. This can lead to full compromise of backup and storage systems, potentially exposing or corrupting critical backup data. The impact extends to confidentiality breaches, integrity violations through unauthorized modifications, and availability disruptions if the attacker manipulates or disables backup processes. Organizations relying on these Dell products for data protection, especially in sectors like finance, healthcare, government, and large enterprises, face risks of data loss, regulatory non-compliance, and operational downtime. The high attack complexity and requirement for local access limit remote exploitation but do not eliminate risk from insider threats or compromised local accounts.

Mitigation Recommendations

1. Immediately restrict local access to systems running affected Dell PowerProtect Data Domain BoostFS versions to trusted personnel only. 2. Implement strict user account controls and monitor for unusual privilege escalations or access patterns. 3. Employ application whitelisting and endpoint detection to identify suspicious activities related to BoostFS components. 4. Regularly audit system permissions and configurations to ensure privilege assignments adhere to the principle of least privilege. 5. Maintain up-to-date backups isolated from the affected systems to enable recovery if compromise occurs. 6. Monitor Dell’s security advisories closely for official patches or updates and apply them promptly once released. 7. Consider deploying host-based intrusion prevention systems (HIPS) to detect and block attempts to exploit privilege assignment flaws. 8. Educate local users about the risks of social engineering or actions requiring user interaction that could facilitate exploitation. 9. Use Linux security modules (e.g., SELinux or AppArmor) to enforce additional access controls around BoostFS processes and files.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-19T05:03:41.170Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e55537a677756fc99a772b

Added to database: 10/7/2025, 6:00:23 PM

Last enriched: 2/27/2026, 2:27:36 AM

Last updated: 3/23/2026, 10:50:41 AM

Views: 163

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses