VYPR
Unrated severityNVD Advisory· Published Oct 7, 2025· Updated Oct 7, 2025

CVE-2025-43913

CVE-2025-43913

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.

Affected products

5
  • Range: >=7.7.1.0, <=8.3.0.15 (Feature Release), =8.3.1.0 (LTS2025), >=7.13.1.0, <=7.13.1.30 (LTS2024), >=7.10.1.0, <=7.10.1.60 (LTS2023)
  • Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023v5
    Range: 7.10.1.0
  • Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024v5
    Range: 7.13.1.0
  • Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2025v5
    Range: 8.3.1.0
  • Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Releasev5
    Range: 7.7.1.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.