Impact
Dell PowerProtect Data Domain suffers from OS Command Injection due to improper neutralization of special elements in command strings. The weakness, identified as CWE‑78, allows a highly privileged attacker with local access to issue arbitrary shell commands that execute with root-level privileges, fully compromising the affected appliance.
Affected Systems
The vulnerable versions are Dell PowerProtect Data Domain 7.7.1.0 through 8.7.0.0, LTS2025 releases 8.3.1.0 through 8.3.1.20, and LTS2024 releases 7.13.1.0 through 7.13.1.60. Any appliance running these builds is susceptible until updated to a patched release.
Risk and Exploitability
The CVSS score of 6.7 indicates moderate severity, but the vulnerability requires local, highly privileged access, limiting its exploitation likelihood. EPSS information is unavailable, and the issue is not listed in the CISA KEV catalog. Because the attack needs local control, the risk is confined to environments where administrative credentials or physical access can be compromised, though a successful exploit would grant full system compromise.
OpenCVE Enrichment