CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
1DescriptionNVD
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 8.4 through 8.5 contain an improper authentication vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access.
AnalysisAI
Dell PowerProtect Data Domain versions 8.4 through 8.5 contain an improper authentication vulnerability allowing high-privileged remote attackers to bypass authentication and gain unauthorized access to the system. CVSS 6.6 (high complexity, high privileges required) reflects the need for elevated attacker credentials but significant confidentiality, integrity, and availability impact. No public exploit code or active exploitation has been identified at time of analysis.
Technical ContextAI
PowerProtect Data Domain is Dell's enterprise deduplication and backup storage platform. The vulnerability resides in the authentication mechanism (CWE-287: Improper Authentication) of DD OS Feature Release versions 8.4 and 8.5, which handle privilege escalation and access control. The improper implementation allows high-privileged users to circumvent normal authentication checks, suggesting either a logic flaw in session validation, privilege boundary enforcement, or role-based access control (RBAC) implementation. The CVSS vector AV:N/AC:H/PR:H indicates the flaw requires network access but is not trivial to exploit (high complexity) and demands pre-existing high-level credentials, limiting the attack surface to administrators or accounts with significant system privileges.
RemediationAI
Apply Dell's security patch released in DSA-2026-060 available at https://www.dell.com/support/kbdoc/en-us/000450699/dsa-2026-060-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities. The exact patched version is not specified in provided references-consult the Dell advisory for version 8.6 or later confirmation. As an interim compensating control, restrict network access to Data Domain administrative interfaces (typically port 3009 for web console and port 111/2049 for NFS) to trusted management subnets only, enforcing ingress filtering at the network perimeter. Implement strong authentication controls for high-privilege accounts: enforce multi-factor authentication (MFA) for administrative logins if supported, disable default service accounts, and rotate administrative credentials immediately. Monitor administrative session logs for anomalous privilege escalation or lateral movement patterns. These controls reduce the window of opportunity for a high-privilege attacker but do not eliminate the underlying flaw.
Share
External POC / Exploit Code
Leaving vuln.today