Dell PowerProtect Exposed: Remote Code Execution Vulnerability Uncovered

Dell Technologies has issued a critical security advisory (DSA-2025-139) warning of a high-severity vulnerability in PowerProtect Data Domain systems that could allow authenticated remote attackers to execute arbitrary commands with root privileges.

The vulnerability, tracked as CVE-2025-29987, affects multiple versions of the Data Domain Operating System (DD OS) and requires immediate patching.

Vulnerability Details

The security flaw stems from insufficient granularity of access control within Dell PowerProtect Data Domain systems running DD OS versions before 8.3.0.15.

Security researchers have identified that authenticated users from trusted remote clients could exploit this vulnerability to gain complete system control through arbitrary command execution with root privileges.

With a CVSS base score of 8.8 (High), this vulnerability represents a significant risk to enterprise data protection systems.

The complete CVSS vector string is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, and high impacts to confidentiality, integrity, and availability.

The Exploit Prediction Scoring System (EPSS) currently rates the probability of exploitation activity in the next 30 days at 0.06%, placing it around the 16th percentile of vulnerabilities.

However, given the high potential impact, immediate remediation is strongly recommended.

Affected Products and Systems

The vulnerability impacts a wide range of Dell PowerProtect products:

ProductAffected VersionsRemediated Versions
DD OS 8.37.7.1.0 through 8.3.0.108.3.0.15 or later
DD OS 7.13.1 (LTS2024)7.13.1.0 through 7.13.1.207.13.1.25 or later
DD OS 7.10.1 (LTS2023)7.10.1.0 through 7.10.1.507.10.1.60 or later
PowerProtect DP Series Appliance2.7.6, 2.7.7, and 2.7.8Same with DD OS 7.10.1.60
Disk Library for mainframe DLm8500/87005.4.0.0/7.0.0.0Same with DD OS 7.10.1.60

Affected appliances include Dell PowerProtect Data Domain series appliances, Dell PowerProtect Data Domain Virtual Edition, and Dell APEX Protection Storage.

Remediation Steps

Dell has released patched versions of the affected software to address this vulnerability.

System administrators should immediately upgrade to the remediated versions specified in the table above.

For PowerProtect DP Series Appliance (IDPA) users, Dell notes that systems running versions 2.7.6, 2.7.7, and 2.7.8 must have their DD OS upgraded to version 7.10.1.60.

The upgrade process involves downloading the appropriate package from Dell’s support site, uploading it through the Data Domain System Manager, and following the standard upgrade procedures.

Dell provides comprehensive documentation for this process, including:

  1. Checking system requirements and compatibility
  2. Performing pre-upgrade checks
  3. Uploading and installing the upgrade package
  4. Conducting post-upgrade verification

Security Impact

If left unpatched, this vulnerability could lead to complete system compromise, potentially enabling attackers to gain unauthorized access to backed-up data, disrupt backup operations, or use the compromised system as a pivot point for further network intrusion.

Organizations using affected Dell PowerProtect Data Domain systems should prioritize applying these security updates as part of their vulnerability management program.

Dell’s advisory also notes that certain security scanners may generate false positive detections even after upgrading to remediated versions.

Dell customers with ProSupport Plus, ProSupport Mission Critical, or Premium service levels can request assistance from Dell’s software upgrade experts to perform the upgrade remotely[5].

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here