Critical Vulnerabilities in Dell PowerProtect Data Domain Expose Systems to Attacks
Severity: High (Score: 72.6)
Sources: www.dell.com, Heise.De
Summary
Dell PowerProtect Data Domain has been found vulnerable to multiple security issues, affecting its ability to protect data in on-premise and multi-cloud environments. A security advisory highlights vulnerabilities in components like Apache Commons FileUpload and OpenSSL, as well as critical vulnerabilities within the application itself. Attackers can exploit these vulnerabilities, including a DoS vulnerability (CVE-2025-48976) and a root security vulnerability (CVE-2026-26944) that allows remote code execution. The vulnerabilities have been classified with high threat levels, with several requiring immediate patching. Dell has released updates to address these issues in versions 7.13.1.70, 8.3.1.30, 8.6.1.10, and 8.7.0.1. As of now, there are no confirmed reports of exploitation, but the potential for attacks remains significant. Administrators are advised to patch their systems promptly to mitigate risks. Key Points: • Multiple critical vulnerabilities in Dell PowerProtect Data Domain require urgent attention. • Attackers can exploit vulnerabilities for remote code execution and DoS attacks. • Dell has released patches for affected versions, but no exploitation has been confirmed yet.
Key Entities
- DDoS (attack_type)
- Malware (attack_type)
- CVE-2016-9840 (cve)
- CVE-2024-12718 (cve)
- CVE-2024-2236 (cve)
- CVE-2024-47081 (cve)
- CVE-2024-9143 (cve)
- CWE-287 - Improper Authentication (cwe)
- T1068 - Exploitation for Privilege Escalation (mitre_attack)
- Apache Commons FileUpload (platform)
- Data Domain Management Center (platform)
- Data Domain Virtual Edition (platform)
- Dell APEX Protection Storage (platform)
- Dell PowerProtect Data Domain Series Appliances (platform)
- Openssl (tool)