CVE-2025-43913
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-07

Last updated on: 2025-10-14

Assigner: Dell

Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-07
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-10-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
dell data_domain_operating_system From 7.7.1.0 (inc) to 7.10.1.70 (exc)
dell data_domain_operating_system From 7.13.1.0 (inc) to 7.13.1.40 (exc)
dell data_domain_operating_system From 8.3.0.0 (inc) to 8.3.0.15 (inc)
dell data_domain_operating_system From 8.3.1.0 (inc) to 8.3.1.10 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-327 The product uses a broken or risky cryptographic algorithm or protocol.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Dell PowerProtect Data Domain Operating System versions 7.7.1.0 through 8.3.0.15 and certain LTS releases. It involves the use of a broken or risky cryptographic algorithm, which can be exploited by an unauthenticated remote attacker. Exploiting this vulnerability could lead to information disclosure and enable phishing attacks that trick users into revealing sensitive information.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive information. Attackers could exploit it remotely without authentication, potentially using the information to conduct phishing attacks that cause users to divulge confidential data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart