Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
References
Configurations
Configuration 1 (hide)
|
History
14 Oct 2025, 20:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities - Vendor Advisory | |
| CPE | cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:* | |
| First Time |
Dell
Dell data Domain Operating System |
07 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-07 19:15
Updated : 2025-10-14 20:09
NVD link : CVE-2025-43909
Mitre link : CVE-2025-43909
CVE.ORG link : CVE-2025-43909
JSON object : View
Products Affected
dell
- data_domain_operating_system
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
