Use of Risky Cryptographic Algorithm in Dell PowerProtect Data Domain
CVE-2025-43909

3.7LOW

What is CVE-2025-43909?

The Dell PowerProtect Data Domain, running specified versions of its Data Domain Operating System, has a vulnerability stemming from the use of a broken cryptographic algorithm within the DD Boost feature. This allows an unauthenticated attacker with remote access to exploit the system, potentially exposing sensitive information to unauthorized parties.

Affected Version(s)

PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023 7.10.1.0 < 7.10.1.70

PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024 7.13.1.0 < 7.13.1.40

PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2025 8.3.1.0 < 8.3.1.10

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-43909 : Use of Risky Cryptographic Algorithm in Dell PowerProtect Data Domain