Impact
An improper neutralization of special elements in the OS command processing of Dell PowerProtect Data Domain allows an attacker with high local privileges to inject arbitrary commands. This flaw can be used to gain unrestricted root execution on the affected system.
Affected Systems
Dell PowerProtect Data Domain versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 through 8.3.1.20, and LTS2024 release versions 7.13.1.0 through 7.13.1.60 are impacted.
Risk and Exploitability
The CVSS score of 6.7 indicates a medium severity vulnerability, and the EPSS score is not available. Because the flaw requires local high-privileged access, the attack vector is inferred to be local. The vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation to date. Nonetheless, the potential for root-level command execution warrants prompt attention.
OpenCVE Enrichment