CVE-2025-46643

2.3 LOW

📋 TL;DR

A heap-based buffer overflow vulnerability in Dell PowerProtect Data Domain with DD OS allows high-privileged attackers with local access to cause denial of service. Affected systems include Data Domain Operating System versions 7.7.1.0 through 8.4.0.0 and specific LTS releases.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: DD OS Feature Release 7.7.1.0 through 8.4.0.0, LTS2025 8.3.1.10, LTS2024 7.13.1.0 through 7.13.1.40, LTS2023 7.10.1.0 through 7.10.1.70
Operating Systems: Data Domain Operating System (DD OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the specified DD OS versions. Requires local access and high privileges.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash and data unavailability due to denial of service, potentially disrupting backup operations.

🟠

Likely Case

Local denial of service affecting specific Data Domain services or processes.

🟢

If Mitigated

Minimal impact due to required high privileges and local access limitations.

🌐 Internet-Facing: LOW - Requires local access and high privileges, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal attackers with administrative access could disrupt critical backup infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and high privileges (administrative/root). No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to versions beyond affected ranges as specified in Dell advisory DSA-2025-415

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000405813/dsa-2025-415-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-415. 2. Download appropriate DD OS update from Dell support. 3. Apply update following Dell's Data Domain upgrade procedures. 4. Reboot system as required.

🔧 Temporary Workarounds

Restrict local administrative access

all

Limit local administrative access to only trusted personnel to reduce attack surface.

Implement strict access controls

all

Enforce principle of least privilege and monitor for unauthorized local access attempts.

🧯 If You Can't Patch

  • Implement strict physical and logical access controls to prevent unauthorized local access.
  • Monitor system logs for unusual local administrative activity and denial of service indicators.

🔍 How to Verify

Check if Vulnerable:

Check DD OS version using 'version' command in Data Domain CLI and compare against affected versions.

Check Version:

version

Verify Fix Applied:

Verify DD OS version is updated beyond affected ranges using 'version' command and check system stability.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • Process termination errors
  • Memory allocation failures in system logs

Network Indicators:

  • Unusual local authentication patterns
  • Increased failed local login attempts

SIEM Query:

source="data_domain" AND (event_type="crash" OR event_type="memory_error" OR event_type="privileged_access")

🔗 References

📤 Share & Export