Impact
A stack-based buffer overflow exists in Dell PowerProtect Data Domain software that allows a high privileged attacker with local access to execute arbitrary commands with root privileges. Exploitation would give the attacker unrestricted control over the system, enabling them to compromise data integrity, confidentiality, or availability.
Affected Systems
Dell PowerProtect Data Domain products from versions 7.7.1.0 through 8.6, LTS2025 releases 8.3.1.0 to 8.3.1.20, and LTS2024 releases 7.13.1.0 to 7.13.1.60 are affected. Users running any of these firmware or software editions are at risk.
Risk and Exploitability
The CVSS score of 6.7 indicates a moderate severity. EPSS information is not available, and the vulnerability is not listed in CISA KEV, suggesting it is not actively exploited in the wild. However, the attack requires local privileged access, which may be obtained through physical access or compromised local accounts. If exploited, root level command execution could lead to full system compromise. Regular patching is the most effective mitigation.
OpenCVE Enrichment