Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46645: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release

0
Medium
VulnerabilityCVE-2025-46645cvecve-2025-46645cwe-78
Published: Fri Jan 09 2026 (01/09/2026, 16:14:35 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Domain with Data Domain Operating System (DD OS) Feature Release

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4.0.0, LTS2025 release version 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.40, LTS 2023 release versions 7.10.1.0 through 7.10.1.70, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution.

AI-Powered Analysis

AILast updated: 01/09/2026, 18:58:42 UTC

Technical Analysis

CVE-2025-46645 is an OS command injection vulnerability classified under CWE-78, found in Dell PowerProtect Data Domain systems running the Data Domain Operating System (DD OS) Feature Release versions 7.7.1.0 through 8.4.0.0, including Long-Term Support (LTS) releases 2023, 2024, and 2025. The vulnerability arises from improper neutralization of special elements in OS commands, allowing a high-privileged remote attacker to inject and execute arbitrary OS commands. This flaw does not require user interaction but does require the attacker to have high-level privileges and remote access to the system. The impact of successful exploitation includes potential compromise of system integrity and availability, as the attacker could execute commands that disrupt backup operations or manipulate stored data. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the requirement of high privileges and the absence of confidentiality impact. No public exploits are currently known, but the vulnerability's presence in widely deployed enterprise backup appliances makes it a significant concern. The lack of available patches at the time of publication necessitates immediate risk mitigation through access controls and monitoring. Dell PowerProtect Data Domain is commonly used in enterprise environments for backup and disaster recovery, making this vulnerability particularly relevant for organizations relying on these systems for data protection.

Potential Impact

For European organizations, the exploitation of CVE-2025-46645 could lead to unauthorized command execution on critical backup infrastructure, potentially resulting in data corruption, deletion, or disruption of backup services. This could compromise data integrity and availability, impacting business continuity and recovery capabilities. Organizations in sectors such as finance, healthcare, telecommunications, and government, which rely heavily on Dell PowerProtect Data Domain for secure and reliable data backup, are at heightened risk. The medium severity rating reflects the need for high privileges to exploit, but given that backup systems often have elevated access and are trusted within networks, a successful attack could have cascading effects. Additionally, disruption of backup systems could delay incident response and recovery from other cyber incidents, increasing overall organizational risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. European entities must consider the potential impact on compliance with data protection regulations like GDPR, where data availability and integrity are critical.

Mitigation Recommendations

1. Immediately restrict remote access to Dell PowerProtect Data Domain systems to trusted administrators only, using network segmentation and VPNs where possible. 2. Implement strict access controls and monitor for unusual or unauthorized privileged activity on affected systems. 3. Regularly audit and review user privileges to ensure the principle of least privilege is enforced, minimizing the number of users with high-level access. 4. Deploy host-based intrusion detection systems (HIDS) and log monitoring to detect suspicious command execution patterns indicative of exploitation attempts. 5. Once Dell releases official patches or updates addressing CVE-2025-46645, prioritize their deployment in all affected environments. 6. Conduct security awareness training for administrators managing backup infrastructure to recognize and respond to potential exploitation signs. 7. Maintain up-to-date backups of backup system configurations and data to enable recovery in case of compromise. 8. Engage with Dell support and subscribe to security advisories to stay informed about updates and mitigation guidance. 9. Consider implementing application whitelisting or command restrictions on backup systems to limit the execution of unauthorized commands. 10. Perform regular vulnerability assessments and penetration testing focused on backup infrastructure to identify and remediate weaknesses proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-26T05:03:53.131Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69614e21047de42cfc77cc6e

Added to database: 1/9/2026, 6:51:13 PM

Last enriched: 1/9/2026, 6:58:42 PM

Last updated: 1/10/2026, 5:57:42 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats