Unrated severityNVD Advisory· Published Oct 7, 2025· Updated Oct 7, 2025
CVE-2025-43909
CVE-2025-43909
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
Affected products
5- Range: 7.7.1.0 through 8.3.0.15, 8.3.1.0, 7.13.1.0 through 7.13.1.30, 7.10.1.0 through 7.10.1.60
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023v5Range: 7.10.1.0
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024v5Range: 7.13.1.0
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2025v5Range: 8.3.1.0
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Releasev5Range: 7.7.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.