Impact
A stack-based buffer overflow in the Domain Operating System allows an attacker to execute arbitrary commands. The flaw propagates executable code without authentication, enabling a full takeover of the affected system. It stems from improper bounds checking and is classed as a buffer overflow vulnerability.
Affected Systems
Dell PowerProtect Data Domain appliances running Domain Operating System Feature Release versions from 7.7.1.0 through 8.6, LTS2025 releases 8.3.1.0 to 8.3.1.10, and LTS2024 releases 7.13.1.0 to 7.13.1.60 are affected.
Risk and Exploitability
The CVSS score of 8.1 classifies this as high severity. The EPSS score of less than 1% indicates a very low likelihood of exploitation, but the vulnerability remains unauthenticated and remotely exploitable with no prerequisite access, meaning an external attacker could trigger it. The vulnerability is not currently cataloged in CISA's KEV list.
OpenCVE Enrichment