Security updates: Root attacks on Dell PowerProtect and Unity possible

Attackers can exploit several vulnerabilities in Dell's backup solution PowerProtect and storage solution Unity.

listen Print view
A filling update bar.

(Image: AFANASEV IVAN/Shutterstock.com)

1 min. read

To prevent possible attacks, admins should update Dell PowerProtect Data Domain and Unity, UnityVSA and Unity XT to the latest version. If this is not done, attackers can access instances with root rights and compromise them.

In a warning message about the vulnerabilities in the Dell PowerProtect Data Domain backup solution, the developers state that gaps in components such as Curl and PostgreSQL have been closed. However, the application's code was also directly vulnerable and attackers could have bypassed security measures to create their own accounts (CVE-2025-36594 "critical").

Because inputs are not sufficiently checked (CVE-2025-30099 "high"), attackers can even execute malicious code with root privileges. Issues 7.1.0.1.60, 7.10.1.70, 7.13.1.30, 8.3.1.0 and 8.4.0.0 are equipped against this.

Videos by heise

Unity is also vulnerable to malicious code attacks as root. Unity Operating Environment 5.5.1 provides a remedy here. According to the developers, all previous versions are vulnerable.

It is currently not known whether there are already attacks.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.