Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46643: CWE-122: Heap-based Buffer Overflow in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release

0
Low
VulnerabilityCVE-2025-46643cvecve-2025-46643cwe-122
Published: Fri Jan 09 2026 (01/09/2026, 16:07:52 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4.0.0, LTS2025 release version 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.40, LTS 2023 release versions 7.10.1.0 through 7.10.1.70, contain a Heap-based Buffer Overflow vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service.

AI-Powered Analysis

AILast updated: 01/09/2026, 16:33:16 UTC

Technical Analysis

CVE-2025-46643 is a heap-based buffer overflow vulnerability identified in Dell PowerProtect Data Domain systems running the Data Domain Operating System (DD OS) across multiple feature release versions (7.7.1.0 through 8.4.0.0) and Long-Term Support (LTS) releases (7.10.1.x, 7.13.1.x, 8.3.1.10). This vulnerability arises from improper handling of heap memory, which can be exploited by a high privileged attacker with local access to the system. Exploitation could cause a denial of service (DoS) by crashing or destabilizing the affected system. The vulnerability does not allow for confidentiality or integrity breaches, nor does it require user interaction. The CVSS v3.1 base score is 2.3, reflecting low severity primarily due to the requirement for local high privilege and the limited impact scope. No public exploits have been reported, and no patches are currently linked, indicating that remediation may require vendor updates once released. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common memory corruption issue that can lead to application crashes or unexpected behavior. Dell PowerProtect Data Domain systems are widely used for enterprise backup and data deduplication, making availability critical for business continuity. An attacker exploiting this vulnerability could disrupt backup operations, potentially impacting data recovery processes.

Potential Impact

For European organizations, the primary impact of CVE-2025-46643 is the potential denial of service on critical backup infrastructure. Dell PowerProtect Data Domain systems are integral to data protection strategies, and disruption could delay backup or restore operations, affecting business continuity and compliance with data retention policies. While confidentiality and integrity are not directly compromised, availability loss in backup systems can indirectly increase risk exposure. Organizations relying heavily on these systems for regulatory compliance, such as those in finance, healthcare, and government sectors, may face operational and reputational risks if backups become unavailable. The requirement for local high privilege access limits the attack surface, but insider threats or compromised administrative accounts could exploit this vulnerability. Given the low CVSS score, the immediate risk is moderate, but the criticality of backup systems elevates the operational impact. European entities with complex IT environments and strict uptime requirements should prioritize monitoring and mitigation to prevent service interruptions.

Mitigation Recommendations

1. Monitor Dell’s official security advisories and apply patches or firmware updates promptly once released to address CVE-2025-46643. 2. Restrict local administrative access to Dell PowerProtect Data Domain systems to trusted personnel only, employing strict access controls and multi-factor authentication where possible. 3. Implement robust logging and monitoring of administrative activities on these systems to detect any unauthorized or suspicious access attempts. 4. Conduct regular security audits and vulnerability assessments on backup infrastructure to identify and remediate privilege escalation risks. 5. Employ network segmentation to isolate backup systems from general user environments, reducing the risk of local exploitation. 6. Develop and test incident response plans specifically for backup system outages to minimize downtime impact. 7. Educate system administrators about the risks of heap-based buffer overflows and the importance of applying security updates promptly. 8. Consider deploying host-based intrusion detection systems (HIDS) on backup servers to detect anomalous behavior indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-26T05:03:53.130Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69612bfb6c9099d823dc1098

Added to database: 1/9/2026, 4:25:31 PM

Last enriched: 1/9/2026, 4:33:16 PM

Last updated: 1/10/2026, 3:41:42 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats