CVE-2025-43909
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-10-07
Last updated on: 2025-10-14
Assigner: Dell
Description
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | data_domain_operating_system | From 7.7.1.0 (inc) to 7.10.1.70 (exc) |
| dell | data_domain_operating_system | From 7.13.1.0 (inc) to 7.13.1.40 (exc) |
| dell | data_domain_operating_system | From 8.3.0.0 (inc) to 8.3.0.15 (inc) |
| dell | data_domain_operating_system | From 8.3.1.0 (inc) to 8.3.1.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Use of a Broken or Risky Cryptographic Algorithm in Dell PowerProtect Data Domain's DD boost feature. It affects certain versions of the Data Domain Operating System. An unauthenticated attacker with remote access could exploit this weakness to expose information.
How can this vulnerability impact me? :
The vulnerability could lead to information exposure if exploited by an unauthenticated remote attacker. This means sensitive data could be accessed without authorization, potentially compromising confidentiality.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70