CVE-2026-23853
Received Received - Intake
Weak Credentials Vulnerability in Dell PowerProtect Data Domain

Publication date: 2026-04-17

Last updated on: 2026-04-17

Assigner: Dell

Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain a use of weak credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to unauthorized access to the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-17
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
dell powerprotect_data_domain From 7.7.1.0 (inc) to 8.5 (inc)
dell powerprotect_data_domain From 8.3.1.0 (inc) to 8.3.1.20 (inc)
dell powerprotect_data_domain From 7.13.1.0 (inc) to 7.13.1.50 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1391 The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions ranging from 7.7.1.0 through 8.5, including certain LTS2025 and LTS2024 release versions. It involves the use of weak credentials that can be exploited by an unauthenticated attacker who has local access to the system. Exploiting this weakness could allow the attacker to gain unauthorized access to the system.


How can this vulnerability impact me? :

The impact of this vulnerability is significant because an unauthenticated attacker with local access could exploit weak credentials to gain unauthorized access. This unauthorized access could lead to a complete compromise of confidentiality, integrity, and availability of the affected system, as indicated by the high CVSS score (8.4) with high impact on confidentiality, integrity, and availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an unauthenticated attacker with local access to potentially gain unauthorized access to the system by exploiting weak credentials.

Such unauthorized access could lead to compromise of sensitive data, which may impact compliance with data protection standards and regulations such as GDPR and HIPAA that require strict access controls and protection of personal and health information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart