CVE-2025-46644: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4.0.0, LTS2025 release version 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.40, LTS2023 release versions 7.10.1.0 through 7.10.1.70, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.
AI Analysis
Technical Summary
CVE-2025-46644 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), affecting Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release versions 7.7.1.0 through 8.4.0.0, including specific LTS releases (LTS2025 8.3.1.10, LTS2024 7.13.1.0-7.13.1.40, LTS2023 7.10.1.0-7.10.1.70). The flaw arises from insufficient sanitization of inputs that are incorporated into OS commands, enabling a high-privileged attacker with local access to inject and execute arbitrary commands on the underlying operating system. This could lead to unauthorized modification or disruption of backup data and system operations. The vulnerability requires the attacker to have elevated privileges and local access, with no user interaction needed, which limits remote exploitation but still poses a significant risk in environments where local access is possible. The CVSS v3.1 base score is 6.0 (medium severity), reflecting the moderate ease of exploitation and significant impact on integrity and availability, but no confidentiality impact. No public exploits or active exploitation have been reported to date. The vulnerability affects critical backup and storage infrastructure, which is essential for data protection and business continuity in enterprise environments.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to data integrity and availability within backup and storage systems. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to data corruption, deletion, or disruption of backup services. This could severely impact disaster recovery capabilities and business continuity, especially in sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Dell PowerProtect Data Domain systems. Although remote exploitation is not feasible, insider threats or attackers who gain local administrative access could leverage this vulnerability to escalate their control or disrupt operations. The absence of confidentiality impact reduces the risk of data leakage but does not diminish the threat to operational stability and data reliability. Organizations with inadequate access controls or monitoring of privileged users are at higher risk.
Mitigation Recommendations
1. Apply official patches or updates from Dell as soon as they become available for all affected versions of PowerProtect Data Domain with DD OS. 2. Restrict local administrative access strictly to trusted personnel and enforce the principle of least privilege to minimize the risk of exploitation by insiders or compromised accounts. 3. Implement robust monitoring and logging of privileged user activities on Data Domain systems to detect suspicious command execution attempts. 4. Use host-based intrusion detection systems (HIDS) to monitor for anomalous OS command executions. 5. Regularly audit and review access permissions and system configurations to ensure no unauthorized changes or backdoors exist. 6. Consider network segmentation to isolate backup infrastructure from general user networks, reducing the risk of lateral movement. 7. Educate administrators on the risks of OS command injection vulnerabilities and the importance of secure management practices. 8. If possible, deploy application whitelisting or command restrictions on the affected systems to prevent unauthorized command execution.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-46644: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4.0.0, LTS2025 release version 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.40, LTS2023 release versions 7.10.1.0 through 7.10.1.70, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-46644 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), affecting Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release versions 7.7.1.0 through 8.4.0.0, including specific LTS releases (LTS2025 8.3.1.10, LTS2024 7.13.1.0-7.13.1.40, LTS2023 7.10.1.0-7.10.1.70). The flaw arises from insufficient sanitization of inputs that are incorporated into OS commands, enabling a high-privileged attacker with local access to inject and execute arbitrary commands on the underlying operating system. This could lead to unauthorized modification or disruption of backup data and system operations. The vulnerability requires the attacker to have elevated privileges and local access, with no user interaction needed, which limits remote exploitation but still poses a significant risk in environments where local access is possible. The CVSS v3.1 base score is 6.0 (medium severity), reflecting the moderate ease of exploitation and significant impact on integrity and availability, but no confidentiality impact. No public exploits or active exploitation have been reported to date. The vulnerability affects critical backup and storage infrastructure, which is essential for data protection and business continuity in enterprise environments.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to data integrity and availability within backup and storage systems. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to data corruption, deletion, or disruption of backup services. This could severely impact disaster recovery capabilities and business continuity, especially in sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Dell PowerProtect Data Domain systems. Although remote exploitation is not feasible, insider threats or attackers who gain local administrative access could leverage this vulnerability to escalate their control or disrupt operations. The absence of confidentiality impact reduces the risk of data leakage but does not diminish the threat to operational stability and data reliability. Organizations with inadequate access controls or monitoring of privileged users are at higher risk.
Mitigation Recommendations
1. Apply official patches or updates from Dell as soon as they become available for all affected versions of PowerProtect Data Domain with DD OS. 2. Restrict local administrative access strictly to trusted personnel and enforce the principle of least privilege to minimize the risk of exploitation by insiders or compromised accounts. 3. Implement robust monitoring and logging of privileged user activities on Data Domain systems to detect suspicious command execution attempts. 4. Use host-based intrusion detection systems (HIDS) to monitor for anomalous OS command executions. 5. Regularly audit and review access permissions and system configurations to ensure no unauthorized changes or backdoors exist. 6. Consider network segmentation to isolate backup infrastructure from general user networks, reducing the risk of lateral movement. 7. Educate administrators on the risks of OS command injection vulnerabilities and the importance of secure management practices. 8. If possible, deploy application whitelisting or command restrictions on the affected systems to prevent unauthorized command execution.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dell
- Date Reserved
- 2025-04-26T05:03:53.130Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961214ef9fa58d9727fd82c
Added to database: 1/9/2026, 3:39:58 PM
Last enriched: 1/9/2026, 3:54:53 PM
Last updated: 1/10/2026, 3:07:23 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22612: CWE-502: Deserialization of Untrusted Data in trailofbits fickling
HighCVE-2026-22609: CWE-184: Incomplete List of Disallowed Inputs in trailofbits fickling
HighCVE-2026-22608: CWE-184: Incomplete List of Disallowed Inputs in trailofbits fickling
HighCVE-2026-22607: CWE-184: Incomplete List of Disallowed Inputs in trailofbits fickling
HighCVE-2026-22606: CWE-184: Incomplete List of Disallowed Inputs in trailofbits fickling
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.