Unrated severityNVD Advisory· Published Oct 7, 2025· Updated Oct 7, 2025
CVE-2025-43913
CVE-2025-43913
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
Affected products
5- Range: >=7.7.1.0, <=8.3.0.15 (Feature Release), =8.3.1.0 (LTS2025), >=7.13.1.0, <=7.13.1.30 (LTS2024), >=7.10.1.0, <=7.10.1.60 (LTS2023)
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023v5Range: 7.10.1.0
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024v5Range: 7.13.1.0
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2025v5Range: 8.3.1.0
- Dell/PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Releasev5Range: 7.7.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.