High
|
Third-Party Component |
CVEs |
More Information |
|
BASFE SSL-J |
CVE-2024-29171, CVE-2024-29172 |
|
|
Bind |
CVE-2024-11187 |
|
|
Certifi |
CVE-2024-39689 |
https://nvd.nist.gov/vuln/search |
|
configobj |
CVE-2023-26112 |
|
|
Cpython |
CVE-2024-7592, CVE-2024-6232, CVE-2024-3219, CVE-2024-6923, CVE-2022-40899 |
|
|
CPython "venv" |
CVE-2024-9287 |
|
|
curl |
CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167 |
|
|
FreeType |
CVE-2025-27363 |
|
|
Glib |
CVE-2024-34397 |
|
|
GNOME Glib |
CVE-2024-52533 |
|
|
GNU C Library |
CVE-2025-0395 |
|
|
grub2 |
CVE-2025-1125, CVE-2025-1118, CVE-2025-0690, CVE-2025-0689, CVE-2025-0686, CVE-2025-0685, CVE-2025-0684, CVE-2025-0678, CVE-2025-0677, CVE-2025-0624, CVE-2025-0622, CVE-2024-56737, CVE-2024-45783, CVE-2024-45782, CVE-2024-45781, CVE-2024-45780, CVE-2024-45779, CVE-2024-45778, CVE-2024-45777, CVE-2024-45776, CVE-2024-45775, CVE-2024-45774 |
|
|
HTTP/2 |
CVE-2023-44487 |
|
|
Jinja |
CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195 |
|
|
Kernel |
CVE-2021-22543, CVE-2021-37159, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48636, CVE-2022-48650, CVE-2022-48664, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-6606, CVE-2023-52572, CVE-2023-52646, CVE-2023-52653, CVE-2023-52853, CVE-2023-52924, CVE-2024-23307, CVE-2024-26810, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-27054, CVE-2024-27388, CVE-2024-27397, CVE-2024-47701, CVE-2024-49867, CVE-2024-49884, CVE-2024-49950, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50067, CVE-2024-50073, CVE-2024-50115, CVE-2024-50251, CVE-2024-50304, CVE-2024-53173, CVE-2024-53217, CVE-2024-53239, CVE-2024-56539, CVE-2024-56605, CVE-2024-56633, CVE-2024-56647, CVE-2024-56658, CVE-2024-56688, CVE-2024-57896, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753, CVE-2024-56533, CVE-2024-56532, CVE-2024-56369, CVE-2024-55916, CVE-2024-53227, CVE-2024-53197, CVE-2024-53185, CVE-2024-53155, CVE-2024-52332, CVE-2024-50142, CVE-2024-49948, CVE-2024-48881, CVE-2024-47809, CVE-2024-26644, CVE-2021-47223, CVE-2021-47222, CVE-2024-57890, CVE-2024-57884, CVE-2024-56769, CVE-2024-56763, CVE-2024-56759, CVE-2024-56748, CVE-2024-56747, CVE-2024-56739, CVE-2024-56722, CVE-2024-56700, CVE-2024-56681, CVE-2024-56662, CVE-2024-56661, CVE-2024-56650, CVE-2024-56643, CVE-2024-56641, CVE-2024-56637, CVE-2024-56630, CVE-2024-56623, CVE-2024-56615, CVE-2024-56601, CVE-2024-56600, CVE-2024-56594, CVE-2024-56593, CVE-2024-56574, CVE-2021-46936, CVE-2021-47163, CVE-2021-47416, CVE-2021-47612, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48809, CVE-2022-48946, CVE-2022-48949, CVE-2022-48951, CVE-2022-48956, CVE-2022-48958, CVE-2022-48960, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48969, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48978, CVE-2022-48985, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48997, CVE-2022-49000, CVE-2022-49002, CVE-2024-50033, CVE-2024-50035, CVE-2024-50045, CVE-2024-50047, CVE-2024-50058, CVE-2025-21682, CVE-2025-21678, CVE-2025-21664, CVE-2025-21653, CVE-2024-57938, CVE-2024-57932, CVE-2024-57931, CVE-2024-57929, CVE-2024-57922, CVE-2024-57903, CVE-2024-57899, CVE-2025-21673 , CVE-2025-21689 , CVE-2024-56548 |
|
|
libexpat1 |
CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492 |
|
|
libtasn1 |
CVE-2024-12133 |
|
|
libxml2 |
CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459 |
|
|
NGINX |
CVE-2024-7347 |
|
|
OpenSSL |
CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-13176 |
|
|
OpenTelemetry-Go |
CVE-2023-45142, CVE-2023-47108, CVE-2024-41110 |
|
|
PostgreSQL libpq |
CVE-2025-1094, CVE-2024-10976, CVE-2024-10977, CVE-2024-10978, CVE-2024-10979 |
|
|
ps utility |
CVE-2023-4016 |
|
|
Requests |
CVE-2024-35195, CVE-2023-32681 |
|
|
rsync |
CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747 |
|
|
setuptools |
CVE-2024-6345 |
|
|
sqlite |
CVE-2023-7104 |
|
|
Sudo |
CVE-2021-3156 |
|
|
systemd-resolved |
CVE-2023-7008 |
|
|
ucode-intel |
CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355, CVE-2024-21820, CVE-2024-21853, CVE-2024-23918 |
|
|
urllib3 |
CVE-2024-37891 |
|
|
WEBrick toolkit |
CVE-2024-47220 |
|
|
X.Org and Xwayland |
CVE-2025-26597 |
|
|
xz |
CVE-2024-47611, CVE-2020-22916 |
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|---|---|---|---|
|
CVE-2025-43914 |
Dell PowerProtect Data Domain BoostFS for Linux Ubuntu systems of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access. |
7.5 |
|
|
CVE-2025-43890 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-43906 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-43911 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-43907 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Path Traversal: '.../...//' vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. |
6.5 |
|
|
CVE-2025-43908 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.4 |
|
|
CVE-2025-43934 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service and Unauthorized access. |
6.0 |
|
|
CVE-2025-43889 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4, LTS2024 release Versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UI. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. |
5.3 |
|
|
CVE-2025-43891 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an use of a Broken or Risky Cryptographic Algorithm vulnerability in the Authentication. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure. |
5.3 |
|
|
CVE-2025-43912 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service. |
5.3 |
|
|
CVE-2025-43913 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information. |
5.3 |
|
|
CVE-2025-45375 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Stack-based Buffer Overflow vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service. |
4.4 |
|
|
CVE-2025-43905 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service. |
4.3 |
|
|
CVE-2025-43909 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. |
3.7 |
|
|
CVE-2025-43910 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Stack-based Buffer Overflow vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service. |
2.3 |
|
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
|---|---|---|---|
|
CVE-2025-43914 |
Dell PowerProtect Data Domain BoostFS for Linux Ubuntu systems of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access. |
7.5 |
|
|
CVE-2025-43890 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-43906 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-43911 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root. |
6.7 |
|
|
CVE-2025-43907 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Path Traversal: '.../...//' vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. |
6.5 |
|
|
CVE-2025-43908 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges. |
6.4 |
|
|
CVE-2025-43934 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service and Unauthorized access. |
6.0 |
|
|
CVE-2025-43889 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4, LTS2024 release Versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UI. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. |
5.3 |
|
|
CVE-2025-43891 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an use of a Broken or Risky Cryptographic Algorithm vulnerability in the Authentication. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure. |
5.3 |
|
|
CVE-2025-43912 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service. |
5.3 |
|
|
CVE-2025-43913 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information. |
5.3 |
|
|
CVE-2025-45375 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Stack-based Buffer Overflow vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service. |
4.4 |
|
|
CVE-2025-43905 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service. |
4.3 |
|
|
CVE-2025-43909 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. |
3.7 |
|
|
CVE-2025-43910 |
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Stack-based Buffer Overflow vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service. |
2.3 |
|
CVEs Addressed |
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|---|
|
CVE-2025-43889 |
DD OS 8.4 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, Dell APEX Protection Storage, and Data Domain Management Center with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.4.0.0 |
Version 8.5.0.0 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2025-43914 |
DD OS 8.4 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
|
|
CVE-2025-43914 |
DD OS 8.3.1 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) LTS2025 8.3.1 |
Versions 8.3.1.0 |
Version 8.3.1.10 or later |
|
|
CVE-2025-43914 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.30 |
Version 7.13.1.40 or later |
|
|
CVE-2025-43914 |
DDOS 7.10.1 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
|
|
CVE-2024-29171, CVE-2024-29172, CVE-2025-27687, CVE-2024-35195, CVE-2022-40899,CVE-2024-7592, CVE-2024-2511,CVE-2024-37891,CVE-2023-32681,CVE-2024-47611,CVE-2024-6232,CVE-2020-22916,CVE-2024-3219,CVE-2024-6923,CVE-2024-6345, CVE-2023-7104, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913, CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910 |
DD OS 8.4 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2025-27687, CVE-2024-35195, CVE-2022-40899,CVE-2024-7592, CVE-2024-2511,CVE-2024-37891,CVE-2023-32681,CVE-2024-47611,CVE-2024-6232,CVE-2020-22916,CVE-2024-3219,CVE-2024-6923,CVE-2024-6345, CVE-2023-7104, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913, CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910 |
DD OS 8.3.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) LTS2025 8.3.1 |
Versions 8.3.1.0 |
Version 8.3.1.10 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913,CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910, CVE-2025-43889 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.30 |
Version 7.13.1.40 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913, CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910, CVE-2025-43889 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2023-4016, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43890, CVE-2025-43891, CVE-2025-43906, CVE-2025-43908,CVE-2025-43910 |
DD OS 8.4 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747 |
DD OS 8.3.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) LTS2025 8.3.1 |
Version 8.3.1.0 |
Version 8.3.1.10 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2023-4016, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914, CVE-2025-43889, CVE-2025-43890, CVE-2025-43891, CVE-2025-43906, CVE-2025-43908,CVE-2025-43910 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.30 |
Version 7.13.1.40 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2023-4016, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914, CVE-2025-43889, CVE-2025-43890, CVE-2025-43891, CVE-2025-43906, CVE-2025-43908,CVE-2025-43910 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2024-11187, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2023-45142, CVE-2023-47108, CVE-2024-41110, CVE-2025-27363, CVE-2024-52533, CVE-2025-0395, CVE-2025-1125, CVE-2025-1118, CVE-2025-0690, CVE-2025-0689, CVE-2025-0686, CVE-2025-0685, CVE-2025-0684, CVE-2025-0678, CVE-2025-0677, CVE-2025-0624, CVE-2025-0622, CVE-2024-56737, CVE-2024-45783, CVE-2024-45782, CVE-2024-45781, CVE-2024-45780, CVE-2024-45779, CVE-2024-45778, CVE-2024-45777, CVE-2024-45776, CVE-2024-45775, CVE-2024-45774, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2021-22543, CVE-2021-37159, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48636, CVE-2022-48650, CVE-2022-48664, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-6606, CVE-2023-52572, CVE-2023-52646, CVE-2023-52653, CVE-2023-52853, CVE-2023-52924, CVE-2024-23307, CVE-2024-26810, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-27054, CVE-2024-27388, CVE-2024-27397, CVE-2024-47701, CVE-2024-49867, CVE-2024-49884, CVE-2024-49950, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50067, CVE-2024-50073, CVE-2024-50115, CVE-2024-50251, CVE-2024-50304, CVE-2024-53173, CVE-2024-53217, CVE-2024-53239, CVE-2024-56539, CVE-2024-56605, CVE-2024-56633, CVE-2024-56647, CVE-2024-56658, CVE-2024-56688, CVE-2024-57896, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753, CVE-2024-56533, CVE-2024-56532, CVE-2024-56369, CVE-2024-55916, CVE-2024-53227, CVE-2024-53197, CVE-2024-53185, CVE-2024-53155, CVE-2024-52332, CVE-2024-50142, CVE-2024-49948, CVE-2024-48881, CVE-2024-47809, CVE-2024-26644, CVE-2021-47223, CVE-2021-47222, CVE-2024-57890, CVE-2024-57884, CVE-2024-56769, CVE-2024-56763, CVE-2024-56759, CVE-2024-56748, CVE-2024-56747, CVE-2024-56739, CVE-2024-56722, CVE-2024-56700, CVE-2024-56681, CVE-2024-56662, CVE-2024-56661, CVE-2024-56650, CVE-2024-56643, CVE-2024-56641, CVE-2024-56637, CVE-2024-56630, CVE-2024-56623, CVE-2024-56615, CVE-2024-56601, CVE-2024-56600, CVE-2024-56594, CVE-2024-56593, CVE-2024-56574, CVE-2021-46936, CVE-2021-47163, CVE-2021-47416, CVE-2021-47612, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48809, CVE-2022-48946, CVE-2022-48949, CVE-2022-48951, CVE-2022-48956, CVE-2022-48958, CVE-2022-48960, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48969, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48978, CVE-2022-48985, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48997, CVE-2022-49000, CVE-2022-49002, CVE-2024-50033, CVE-2024-50035, CVE-2024-50045, CVE-2024-50047, CVE-2024-50058, CVE-2025-21682, CVE-2025-21678, CVE-2025-21664, CVE-2025-21653, CVE-2024-57938, CVE-2024-57932, CVE-2024-57931, CVE-2024-57929, CVE-2024-57922, CVE-2024-57903, CVE-2024-57899, CVE-2025-21673, CVE-2025-21689 , CVE-2024-56548, CVE-2025-24528, CVE-2024-11053, CVE-2024-9681, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979,CVE-2024-9287,CVE-2024-12133,CVE-2023-7008,CVE-2025-26597,CVE-2024-56171,CVE-2025-24928,CVE-2025-27113,CVE-2022-49043,CVE-2024-34459,CVE-2023-44487,CVE-2024-7347,CVE-2025-26465,CVE-2024-9143,CVE-2023-4016,CVE-2024-12085,CVE-2024-12086,CVE-2024-12087,CVE-2024-12088,CVE-2024-12747,CVE-2024-47220,CVE-2021-3156,CVE-2024-31068,CVE-2024-36293,CVE-2024-37020,CVE-2024-39355,CVE-2024-21820,CVE-2024-21853, CVE-2024-23918 |
DD OS 8.4 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVEs Addressed |
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
|---|---|---|---|---|---|
|
CVE-2025-43889 |
DD OS 8.4 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, Dell APEX Protection Storage, and Data Domain Management Center with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.4.0.0 |
Version 8.5.0.0 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2025-43914 |
DD OS 8.4 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
|
|
CVE-2025-43914 |
DD OS 8.3.1 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) LTS2025 8.3.1 |
Versions 8.3.1.0 |
Version 8.3.1.10 or later |
|
|
CVE-2025-43914 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.30 |
Version 7.13.1.40 or later |
|
|
CVE-2025-43914 |
DDOS 7.10.1 |
Dell PowerProtect Data Domain boostFS for Linux Ubuntu systems with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
|
|
CVE-2024-29171, CVE-2024-29172, CVE-2025-27687, CVE-2024-35195, CVE-2022-40899,CVE-2024-7592, CVE-2024-2511,CVE-2024-37891,CVE-2023-32681,CVE-2024-47611,CVE-2024-6232,CVE-2020-22916,CVE-2024-3219,CVE-2024-6923,CVE-2024-6345, CVE-2023-7104, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913, CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910 |
DD OS 8.4 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2025-27687, CVE-2024-35195, CVE-2022-40899,CVE-2024-7592, CVE-2024-2511,CVE-2024-37891,CVE-2023-32681,CVE-2024-47611,CVE-2024-6232,CVE-2020-22916,CVE-2024-3219,CVE-2024-6923,CVE-2024-6345, CVE-2023-7104, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913, CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910 |
DD OS 8.3.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) LTS2025 8.3.1 |
Versions 8.3.1.0 |
Version 8.3.1.10 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913,CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910, CVE-2025-43889 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.30 |
Version 7.13.1.40 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2020-13936, CVE-2020-13936, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914,CVE-2025-43890,CVE-2025-43906,CVE-2025-43911,CVE-2025-43907,CVE-2025-43908,CVE-2025-43934,CVE-2025-43891,CVE-2025-43912,CVE-2025-43913, CVE-2025-45375,CVE-2025-43905,CVE-2025-43909,CVE-2025-43910, CVE-2025-43889 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain series appliances, Data Domain Virtual Edition, and Dell APEX Protection Storage with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
Support for Data Domain Deduplication Storage Systems (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2023-4016, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43890, CVE-2025-43891, CVE-2025-43906, CVE-2025-43908,CVE-2025-43910 |
DD OS 8.4 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
Support for DD OS | Drivers & Downloads (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747 |
DD OS 8.3.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) LTS2025 8.3.1 |
Version 8.3.1.0 |
Version 8.3.1.10 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2023-4016, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914, CVE-2025-43889, CVE-2025-43890, CVE-2025-43891, CVE-2025-43906, CVE-2025-43908,CVE-2025-43910 |
DD OS 7.13.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) LTS2024 7.13.1 |
Versions 7.13.1.0 through 7.13.1.30 |
Version 7.13.1.40 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2025-0395, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492,CVE-2024-34397, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979, CVE-2023-4016, CVE-2024-9287, CVE-2024-12133, CVE-2023-7008, CVE-2025-26597, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2022-49043, CVE-2024-34459, CVE-2023-44487, CVE-2024-7347, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747, CVE-2025-43914, CVE-2025-43889, CVE-2025-43890, CVE-2025-43891, CVE-2025-43906, CVE-2025-43908,CVE-2025-43910 |
DD OS 7.10.1 |
Dell PowerProtect Data Domain Management Center with Data Domain Operating System (DD OS) LTS2023 7.10.1 |
Versions 7.10.1.0 through 7.10.1.60 |
Version 7.10.1.70 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
CVE-2024-29171, CVE-2024-29172, CVE-2024-11187, CVE-2023-26112, CVE-2024-9681, CVE-2024-11053, CVE-2025-0725, CVE-2025-0167, CVE-2023-45142, CVE-2023-47108, CVE-2024-41110, CVE-2025-27363, CVE-2024-52533, CVE-2025-0395, CVE-2025-1125, CVE-2025-1118, CVE-2025-0690, CVE-2025-0689, CVE-2025-0686, CVE-2025-0685, CVE-2025-0684, CVE-2025-0678, CVE-2025-0677, CVE-2025-0624, CVE-2025-0622, CVE-2024-56737, CVE-2024-45783, CVE-2024-45782, CVE-2024-45781, CVE-2024-45780, CVE-2024-45779, CVE-2024-45778, CVE-2024-45777, CVE-2024-45776, CVE-2024-45775, CVE-2024-45774, CVE-2024-56326, CVE-2024-56201, CVE-2025-27516, CVE-2024-34064, CVE-2024-22195, CVE-2021-22543, CVE-2021-37159, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48636, CVE-2022-48650, CVE-2022-48664, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-6606, CVE-2023-52572, CVE-2023-52646, CVE-2023-52653, CVE-2023-52853, CVE-2023-52924, CVE-2024-23307, CVE-2024-26810, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-27054, CVE-2024-27388, CVE-2024-27397, CVE-2024-47701, CVE-2024-49867, CVE-2024-49884, CVE-2024-49950, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50067, CVE-2024-50073, CVE-2024-50115, CVE-2024-50251, CVE-2024-50304, CVE-2024-53173, CVE-2024-53217, CVE-2024-53239, CVE-2024-56539, CVE-2024-56605, CVE-2024-56633, CVE-2024-56647, CVE-2024-56658, CVE-2024-56688, CVE-2024-57896, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753, CVE-2024-56533, CVE-2024-56532, CVE-2024-56369, CVE-2024-55916, CVE-2024-53227, CVE-2024-53197, CVE-2024-53185, CVE-2024-53155, CVE-2024-52332, CVE-2024-50142, CVE-2024-49948, CVE-2024-48881, CVE-2024-47809, CVE-2024-26644, CVE-2021-47223, CVE-2021-47222, CVE-2024-57890, CVE-2024-57884, CVE-2024-56769, CVE-2024-56763, CVE-2024-56759, CVE-2024-56748, CVE-2024-56747, CVE-2024-56739, CVE-2024-56722, CVE-2024-56700, CVE-2024-56681, CVE-2024-56662, CVE-2024-56661, CVE-2024-56650, CVE-2024-56643, CVE-2024-56641, CVE-2024-56637, CVE-2024-56630, CVE-2024-56623, CVE-2024-56615, CVE-2024-56601, CVE-2024-56600, CVE-2024-56594, CVE-2024-56593, CVE-2024-56574, CVE-2021-46936, CVE-2021-47163, CVE-2021-47416, CVE-2021-47612, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48809, CVE-2022-48946, CVE-2022-48949, CVE-2022-48951, CVE-2022-48956, CVE-2022-48958, CVE-2022-48960, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48969, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48978, CVE-2022-48985, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48997, CVE-2022-49000, CVE-2022-49002, CVE-2024-50033, CVE-2024-50035, CVE-2024-50045, CVE-2024-50047, CVE-2024-50058, CVE-2025-21682, CVE-2025-21678, CVE-2025-21664, CVE-2025-21653, CVE-2024-57938, CVE-2024-57932, CVE-2024-57931, CVE-2024-57929, CVE-2024-57922, CVE-2024-57903, CVE-2024-57899, CVE-2025-21673, CVE-2025-21689 , CVE-2024-56548, CVE-2025-24528, CVE-2024-11053, CVE-2024-9681, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-34397, CVE-2024-5535, CVE-2023-50782, CVE-2024-2511, CVE-2024-13176, CVE-2025-1094,CVE-2024-10976,CVE-2024-10977,CVE-2024-10978,CVE-2024-10979,CVE-2024-9287,CVE-2024-12133,CVE-2023-7008,CVE-2025-26597,CVE-2024-56171,CVE-2025-24928,CVE-2025-27113,CVE-2022-49043,CVE-2024-34459,CVE-2023-44487,CVE-2024-7347,CVE-2025-26465,CVE-2024-9143,CVE-2023-4016,CVE-2024-12085,CVE-2024-12086,CVE-2024-12087,CVE-2024-12088,CVE-2024-12747,CVE-2024-47220,CVE-2021-3156,CVE-2024-31068,CVE-2024-36293,CVE-2024-37020,CVE-2024-39355,CVE-2024-21820,CVE-2024-21853, CVE-2024-23918 |
DD OS 8.4 |
Dell PowerProtect Data Domain Management Center with SmartScale feature with Data Domain Operating System (DD OS) Feature Release |
Versions 7.7.1.0 through 8.3.0.15 |
Version 8.4.0.0 or later |
Support for PowerProtect Data Domain Management Center (Dell Support login required) |
|
Revision |
Date |
Description |
|---|---|---|
|
1.0 |
2025-10-01 |
Initial Release |
|
2.0 |
2025-10-07 |
Updated Proprietary Code section — revised CVSS Base Score to 6.4 for CVE-2025-43908 |
|
3.0 |
2025-10-24 |
Updated for clarity with no major changes to content |