Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
References
Configurations
Configuration 1 (hide)
|
History
14 Oct 2025, 20:09
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Dell
Dell data Domain Operating System |
|
| CPE | cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:* | |
| References | () https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities - Vendor Advisory |
07 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-07 19:15
Updated : 2025-10-14 20:09
NVD link : CVE-2025-43913
Mitre link : CVE-2025-43913
CVE.ORG link : CVE-2025-43913
JSON object : View
Products Affected
dell
- data_domain_operating_system
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
