CVE-2025-43891
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-10-07
Last updated on: 2025-10-14
Assigner: Dell
Description
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an use of a Broken or Risky Cryptographic Algorithm vulnerability in the Authentication. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | data_domain_operating_system | From 7.7.1.0 (inc) to 7.10.1.70 (exc) |
| dell | data_domain_operating_system | From 7.13.1.0 (inc) to 7.13.1.40 (exc) |
| dell | data_domain_operating_system | From 8.3.0.0 (inc) to 8.3.0.15 (inc) |
| dell | data_domain_operating_system | From 8.3.1.0 (inc) to 8.3.1.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Dell PowerProtect Data Domain Operating System versions specified, where a broken or risky cryptographic algorithm is used in the authentication process. An unauthenticated attacker with remote access could exploit this weakness to disclose information.
How can this vulnerability impact me? :
The vulnerability could allow an unauthenticated remote attacker to gain access to sensitive information due to the use of a weak cryptographic algorithm in authentication, potentially leading to information disclosure.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70