Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46644: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release

0
Medium
VulnerabilityCVE-2025-46644cvecve-2025-46644cwe-78
Published: Fri Jan 09 2026 (01/09/2026, 15:31:19 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4.0.0, LTS2025 release version 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.40, LTS2023 release versions 7.10.1.0 through 7.10.1.70, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.

AI-Powered Analysis

AILast updated: 01/09/2026, 15:54:53 UTC

Technical Analysis

CVE-2025-46644 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), affecting Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release versions 7.7.1.0 through 8.4.0.0, including specific LTS releases (LTS2025 8.3.1.10, LTS2024 7.13.1.0-7.13.1.40, LTS2023 7.10.1.0-7.10.1.70). The flaw arises from insufficient sanitization of inputs that are incorporated into OS commands, enabling a high-privileged attacker with local access to inject and execute arbitrary commands on the underlying operating system. This could lead to unauthorized modification or disruption of backup data and system operations. The vulnerability requires the attacker to have elevated privileges and local access, with no user interaction needed, which limits remote exploitation but still poses a significant risk in environments where local access is possible. The CVSS v3.1 base score is 6.0 (medium severity), reflecting the moderate ease of exploitation and significant impact on integrity and availability, but no confidentiality impact. No public exploits or active exploitation have been reported to date. The vulnerability affects critical backup and storage infrastructure, which is essential for data protection and business continuity in enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to data integrity and availability within backup and storage systems. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to data corruption, deletion, or disruption of backup services. This could severely impact disaster recovery capabilities and business continuity, especially in sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Dell PowerProtect Data Domain systems. Although remote exploitation is not feasible, insider threats or attackers who gain local administrative access could leverage this vulnerability to escalate their control or disrupt operations. The absence of confidentiality impact reduces the risk of data leakage but does not diminish the threat to operational stability and data reliability. Organizations with inadequate access controls or monitoring of privileged users are at higher risk.

Mitigation Recommendations

1. Apply official patches or updates from Dell as soon as they become available for all affected versions of PowerProtect Data Domain with DD OS. 2. Restrict local administrative access strictly to trusted personnel and enforce the principle of least privilege to minimize the risk of exploitation by insiders or compromised accounts. 3. Implement robust monitoring and logging of privileged user activities on Data Domain systems to detect suspicious command execution attempts. 4. Use host-based intrusion detection systems (HIDS) to monitor for anomalous OS command executions. 5. Regularly audit and review access permissions and system configurations to ensure no unauthorized changes or backdoors exist. 6. Consider network segmentation to isolate backup infrastructure from general user networks, reducing the risk of lateral movement. 7. Educate administrators on the risks of OS command injection vulnerabilities and the importance of secure management practices. 8. If possible, deploy application whitelisting or command restrictions on the affected systems to prevent unauthorized command execution.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-26T05:03:53.130Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961214ef9fa58d9727fd82c

Added to database: 1/9/2026, 3:39:58 PM

Last enriched: 1/9/2026, 3:54:53 PM

Last updated: 1/10/2026, 3:07:23 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats