DSA-2025-159: Security Update for Dell PowerProtect Data Domain Multiple Vulnerabilities
Summary: Dell PowerProtect Data Domain remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Impact
Critical
Details
|
Third-Party Component |
CVEs |
More Information |
|---|---|---|
|
IDRAC9 |
CVE-2023-52340, CVE-2024-42154 |
DSA-2024-460: Security Update for Dell iDRAC9 Vulnerabilities |
|
Velocity |
CVE-2020-13936 |
|
|
container-suseconnect |
CVE-2024-24789, CVE-2024-24790, CVE-2024-24791 |
|
|
CUPS |
CVE-2024-47850, CVE-2024-47176 |
|
| Curl
|
CVE-2024-8096, CVE-2024-7264, CVE-2024-9681 |
|
|
expat |
CVE-2023-52425, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492 |
|
|
Glib2 |
CVE-2024-34397 |
|
|
Kernel |
CVE-2021-4440, CVE-2021-47257, CVE-2021-47289, CVE-2021-47341, CVE-2021-47373, CVE-2021-47425, CVE-2021-47549, CVE-2022-48751, CVE-2022-48769, CVE-2022-48786, CVE-2022-48822, CVE-2022-48865, CVE-2022-48875, CVE-2022-48896, CVE-2022-48899, CVE-2022-48905, CVE-2022-48910, CVE-2022-48919, CVE-2022-48920, CVE-2022-48925 |
|
|
Openssl |
CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143 |
|
|
libpcap |
CVE-2024-8006, CVE-2023-7256 |
|
|
PostgreSQL |
CVE-2024-4317, CVE-2024-7348 |
|
|
Mesa |
CVE-2023-45913, CVE-2023-45919, CVE-2023-45922 |
|
|
OpenIPMI |
CVE-2024-42934 |
|
|
OpenSC |
CVE-2024-8443, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620 |
|
|
Perl-DBI |
CVE-2014-10401, CVE-2014-10402 |
|
|
CPython |
CVE-2024-6923, CVE-2024-7592, CVE-2024-5642, CVE-2024-6232, CVE-2024-9287 |
|
|
runc |
CVE-2024-45310 |
|
|
Setuptools |
CVE-2024-6345 |
|
|
Ucode-intel |
CVE-2024-24968, CVE-2024-23984 |
|
|
GNU Wget |
CVE-2024-38428 |
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|---|---|---|---|
|
CVE-2025-36594 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability. |
9.8 |
|
|
CVE-2025-30099 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A low privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
7.8 |
|
|
CVE-2025-30098 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.7 |
|
|
CVE-2025-30097 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges |
6.7 |
|
|
CVE-2025-30096 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.7 |
|
|
CVE-2025-43727 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an incorrect Implementation of Authentication Algorithm vulnerability in the RestAPI. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. |
7.5 |
|
|
CVE-2025-36565 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-36566 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-36569 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.7 |
|
|
CVE-2025-36567 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|---|---|---|---|
|
CVE-2025-36594 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability. |
9.8 |
|
|
CVE-2025-30099 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A low privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
7.8 |
|
|
CVE-2025-30098 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.7 |
|
|
CVE-2025-30097 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges |
6.7 |
|
|
CVE-2025-30096 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.7 |
|
|
CVE-2025-43727 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an incorrect Implementation of Authentication Algorithm vulnerability in the RestAPI. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. |
7.5 |
|
|
CVE-2025-36565 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-36566 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-36569 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.7 |
|
|
CVE-2025-36567 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
Affected Products & Remediation
|
CVEs Addressed |
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|---|
|
CVE-2025-36594 |
DD OS 8.3 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, Dell APEX Protection Storage, and Data Domain Management Center, with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.3.1.0, 8.4.0.0, or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2025-36594 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage, and Data Domain Management Center, with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2025-36594 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage, and Data Domain Management Center, with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2023-52340, CVE-2024-42154, CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 8.3 |
Dell PowerProtect Data Domain series appliances with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2023-52340, CVE-2024-42154, CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain series appliances with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2023-52340, CVE-2024-42154, CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569,CVE-2025-36567 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain series appliances with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 8.3 |
Dell PowerProtect Data Domain Virtual Edition, Dell APEX Protection Storage with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Virtual Edition and Dell APEX Protection Storage, with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Virtual Edition and Dell APEX Protection Storage, with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-4317, CVE-2024-7348, CVE-2024-6232, CVE-2024-7592, CVE-2024-8088, CVE-2024-9287, CVE-2024-6345, CVE-2024-38428, CVE-2025-36565 |
DD OS 8.3 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-4317, CVE-2024-7348, CVE-2024-6232, CVE-2024-7592, CVE-2024-8088, CVE-2024-9287, CVE-2024-6345, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS), LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-4317, CVE-2024-7348, CVE-2024-6232, CVE-2024-7592, CVE-2024-8088, CVE-2024-9287, CVE-2024-6345, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS), LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-47850, CVE-2024-47176, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2023-52425, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2021-4440, CVE-2021-47257, CVE-2021-47289, CVE-2021-47341, CVE-2021-47373, CVE-2021-47425, CVE-2021-47549, CVE-2022-48751, CVE-2022-48769, CVE-2022-48786, CVE-2022-48822, CVE-2022-48865, CVE-2022-48875, CVE-2022-48896, CVE-2022-48899, CVE-2022-48905, CVE-2022-48910, CVE-2022-48919, CVE-2022-48920, CVE-2022-48925, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-8006, CVE-2023-7256, CVE-2024-4317, CVE-2024-7348, CVE-2023-45913, CVE-2023-45919, CVE-2023-45922, CVE-2024-42934, CVE-2024-8443, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2014-10401, CVE-2014-10402, CVE-2024-6923, CVE-2024-7592, CVE-2024-5642, CVE-2024-6232, CVE-2024-9287, CVE-2024-45310, CVE-2024-6345, CVE-2024-24968, CVE-2024-23984, CVE-2024-38428, CVE-2025-36565 |
DD OS 8.3 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-47850, CVE-2024-47176, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2023-52425, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2021-4440, CVE-2021-47257, CVE-2021-47289, CVE-2021-47341, CVE-2021-47373, CVE-2021-47425, CVE-2021-47549, CVE-2022-48751, CVE-2022-48769, CVE-2022-48786, CVE-2022-48822, CVE-2022-48865, CVE-2022-48875, CVE-2022-48896, CVE-2022-48899, CVE-2022-48905, CVE-2022-48910, CVE-2022-48919, CVE-2022-48920, CVE-2022-48925, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-8006, CVE-2023-7256, CVE-2024-4317, CVE-2024-7348, CVE-2023-45913, CVE-2023-45919, CVE-2023-45922, CVE-2024-42934, CVE-2024-8443, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2014-10401, CVE-2014-10402, CVE-2024-6923, CVE-2024-7592, CVE-2024-5642, CVE-2024-6232, CVE-2024-9287, CVE-2024-45310, CVE-2024-6345, CVE-2024-24968, CVE-2024-23984, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-47850, CVE-2024-47176, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2023-52425, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2021-4440, CVE-2021-47257, CVE-2021-47289, CVE-2021-47341, CVE-2021-47373, CVE-2021-47425, CVE-2021-47549, CVE-2022-48751, CVE-2022-48769, CVE-2022-48786, CVE-2022-48822, CVE-2022-48865, CVE-2022-48875, CVE-2022-48896, CVE-2022-48899, CVE-2022-48905, CVE-2022-48910, CVE-2022-48919, CVE-2022-48920, CVE-2022-48925, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-8006, CVE-2023-7256, CVE-2024-4317, CVE-2024-7348, CVE-2023-45913, CVE-2023-45919, CVE-2023-45922, CVE-2024-42934, CVE-2024-8443, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2014-10401, CVE-2014-10402, CVE-2024-6923, CVE-2024-7592, CVE-2024-5642, CVE-2024-6232, CVE-2024-9287, CVE-2024-45310, CVE-2024-6345, CVE-2024-24968, CVE-2024-23984, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVEs Addressed |
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|---|
|
CVE-2025-36594 |
DD OS 8.3 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, Dell APEX Protection Storage, and Data Domain Management Center, with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.3.1.0, 8.4.0.0, or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2025-36594 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage, and Data Domain Management Center, with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2025-36594 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage, and Data Domain Management Center, with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2023-52340, CVE-2024-42154, CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 8.3 |
Dell PowerProtect Data Domain series appliances with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2023-52340, CVE-2024-42154, CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain series appliances with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2023-52340, CVE-2024-42154, CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569,CVE-2025-36567 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain series appliances with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 8.3 |
Dell PowerProtect Data Domain Virtual Edition, Dell APEX Protection Storage with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Virtual Edition and Dell APEX Protection Storage, with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-9143, CVE-2024-5535, CVE-2025-30096, CVE-2025-30099, CVE-2025-30098, CVE-2025-30097, CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Virtual Edition and Dell APEX Protection Storage, with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-4317, CVE-2024-7348, CVE-2024-6232, CVE-2024-7592, CVE-2024-8088, CVE-2024-9287, CVE-2024-6345, CVE-2024-38428, CVE-2025-36565 |
DD OS 8.3 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-4317, CVE-2024-7348, CVE-2024-6232, CVE-2024-7592, CVE-2024-8088, CVE-2024-9287, CVE-2024-6345, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS), LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-4317, CVE-2024-7348, CVE-2024-6232, CVE-2024-7592, CVE-2024-8088, CVE-2024-9287, CVE-2024-6345, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS), LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-47850, CVE-2024-47176, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2023-52425, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2021-4440, CVE-2021-47257, CVE-2021-47289, CVE-2021-47341, CVE-2021-47373, CVE-2021-47425, CVE-2021-47549, CVE-2022-48751, CVE-2022-48769, CVE-2022-48786, CVE-2022-48822, CVE-2022-48865, CVE-2022-48875, CVE-2022-48896, CVE-2022-48899, CVE-2022-48905, CVE-2022-48910, CVE-2022-48919, CVE-2022-48920, CVE-2022-48925, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-8006, CVE-2023-7256, CVE-2024-4317, CVE-2024-7348, CVE-2023-45913, CVE-2023-45919, CVE-2023-45922, CVE-2024-42934, CVE-2024-8443, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2014-10401, CVE-2014-10402, CVE-2024-6923, CVE-2024-7592, CVE-2024-5642, CVE-2024-6232, CVE-2024-9287, CVE-2024-45310, CVE-2024-6345, CVE-2024-24968, CVE-2024-23984, CVE-2024-38428, CVE-2025-36565 |
DD OS 8.3 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) Feature Release 8.3.0 |
Versions 7.7.1.0 through 8.1.0.10 |
Version 8.3.0.10 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-47850, CVE-2024-47176, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2023-52425, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2021-4440, CVE-2021-47257, CVE-2021-47289, CVE-2021-47341, CVE-2021-47373, CVE-2021-47425, CVE-2021-47549, CVE-2022-48751, CVE-2022-48769, CVE-2022-48786, CVE-2022-48822, CVE-2022-48865, CVE-2022-48875, CVE-2022-48896, CVE-2022-48899, CVE-2022-48905, CVE-2022-48910, CVE-2022-48919, CVE-2022-48920, CVE-2022-48925, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-8006, CVE-2023-7256, CVE-2024-4317, CVE-2024-7348, CVE-2023-45913, CVE-2023-45919, CVE-2023-45922, CVE-2024-42934, CVE-2024-8443, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2014-10401, CVE-2014-10402, CVE-2024-6923, CVE-2024-7592, CVE-2024-5642, CVE-2024-6232, CVE-2024-9287, CVE-2024-45310, CVE-2024-6345, CVE-2024-24968, CVE-2024-23984, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.25 |
Version 7.13.1.30 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2020-13936, CVE-2024-24789, CVE-2024-24790, CVE-2024-24791, CVE-2024-47850, CVE-2024-47176, CVE-2024-8096, CVE-2024-7264, CVE-2024-9681, CVE-2023-52425, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2021-4440, CVE-2021-47257, CVE-2021-47289, CVE-2021-47341, CVE-2021-47373, CVE-2021-47425, CVE-2021-47549, CVE-2022-48751, CVE-2022-48769, CVE-2022-48786, CVE-2022-48822, CVE-2022-48865, CVE-2022-48875, CVE-2022-48896, CVE-2022-48899, CVE-2022-48905, CVE-2022-48910, CVE-2022-48919, CVE-2022-48920, CVE-2022-48925, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-9143, CVE-2024-8006, CVE-2023-7256, CVE-2024-4317, CVE-2024-7348, CVE-2023-45913, CVE-2023-45919, CVE-2023-45922, CVE-2024-42934, CVE-2024-8443, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2014-10401, CVE-2014-10402, CVE-2024-6923, CVE-2024-7592, CVE-2024-5642, CVE-2024-6232, CVE-2024-9287, CVE-2024-45310, CVE-2024-6345, CVE-2024-24968, CVE-2024-23984, CVE-2024-38428, CVE-2025-36565 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.50 |
Version 7.10.1.60 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
- PowerProtect Data Domain: Software Versions : This KB article provides the status of the current active PowerProtect Data Domain Operating System (DD OS) releases, along with links to the release notes. (Requires support.dell.com login to view article).
- For instructions on how to upgrade Data Domain Operating System (DD OS), see Data Domain and DDVE: How to Upgrade the Data Domain Operating System
- Some security scanners may still report False Positive findings after upgrading to remediated DDOS versions. For more details, please refer to the respective False Positive KB articles:
Revision History
|
Revision |
Date |
Description |
|---|---|---|
|
1.0 |
2025-07-31 |
Initial Release |
|
2.0 |
2025-10-06 |
Updated CVE Identifier, Proprietary Code, Affected Products and Remediation section to include additional CVEs: CVE-2025-43727, CVE-2025-36565, CVE-2025-36566, CVE-2025-36569, CVE-2025-36567 |