Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43934: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

0
Medium
VulnerabilityCVE-2025-43934cvecve-2025-43934cwe-22
Published: Tue Oct 07 2025 (10/07/2025, 18:30:18 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service and Unauthorized access.

AI-Powered Analysis

AILast updated: 10/07/2025, 19:00:26 UTC

Technical Analysis

CVE-2025-43934 is a path traversal vulnerability classified under CWE-22 affecting Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS) feature releases from version 7.7.1.0 up to 8.3.0.15, including several Long Term Support (LTS) releases (LTS2025 8.3.1.0, LTS2024 7.13.1.0 through 7.13.1.30, and LTS2023 7.10.1.0 through 7.10.1.60). The vulnerability arises from improper limitation of pathname inputs, allowing a high-privileged attacker with local system access to traverse directories beyond intended restrictions. This can lead to unauthorized access to sensitive files outside the designated directories and potentially cause denial of service conditions by manipulating system files or resources. The CVSS v3.1 score of 6.0 reflects a medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). Exploitation requires the attacker to already have high-level privileges and local access, limiting remote exploitation risk but still posing a significant threat in environments where insider threats or compromised accounts exist. No public exploits have been reported to date, but the vulnerability's presence in critical backup and data protection infrastructure makes it a notable risk. The affected systems are commonly deployed in enterprise environments for data backup, deduplication, and disaster recovery, making confidentiality and availability impacts particularly concerning.

Potential Impact

For European organizations, the impact of CVE-2025-43934 can be significant due to the critical role Dell PowerProtect Data Domain systems play in data backup and recovery operations. Unauthorized access to backup data could lead to exposure of sensitive corporate or customer information, violating data protection regulations such as GDPR. Denial of service conditions could disrupt backup and restore processes, impacting business continuity and recovery capabilities. Organizations relying heavily on these systems for compliance and operational resilience may face increased risk of data loss or regulatory penalties. The requirement for high privileges and local access reduces the likelihood of widespread remote exploitation but does not eliminate insider threat risks or risks from attackers who have already gained elevated access through other means. Given the importance of data protection infrastructure, even medium severity vulnerabilities warrant prompt attention to avoid cascading impacts on confidentiality and availability.

Mitigation Recommendations

1. Apply patches or updates provided by Dell as soon as they become available for the affected DD OS versions and LTS releases. 2. Restrict local access to Dell PowerProtect Data Domain systems strictly to authorized personnel only, using strong access controls and multi-factor authentication where possible. 3. Monitor system logs and file access patterns for unusual directory traversal attempts or unauthorized file access activities. 4. Implement network segmentation to isolate backup infrastructure from general user networks, reducing the risk of privilege escalation and lateral movement. 5. Conduct regular audits of user privileges and remove unnecessary high-level access to minimize the attack surface. 6. Employ endpoint security solutions on systems with local access to detect and prevent exploitation attempts. 7. Educate administrators and operators about the risks of path traversal vulnerabilities and the importance of secure handling of file paths and inputs. 8. Maintain up-to-date backups and test recovery procedures to mitigate the impact of potential denial of service or data corruption incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-20T05:04:01.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e55fc5a677756fc99c5727

Added to database: 10/7/2025, 6:45:25 PM

Last enriched: 10/7/2025, 7:00:26 PM

Last updated: 10/8/2025, 9:59:01 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats