Countless security vulnerabilities in Dell PowerProtect Data Domain closed

Dell's backup solution PowerProtect Data Domain is vulnerable. Security updates provide a remedy.

listen Print view

(Image: Artur Szczybylo/Shutterstock.com)

1 min. read

If the conditions are right, attackers can attack Dell PowerProtect Data Domain and compromise systems as root. Security patches are available for download.

According to a warning message, the developers have closed countless vulnerabilities in the application itself, but also in components such as Bind, FreeType and OpenSSL. If attackers successfully exploit the gaps, they can gain unauthorised access to systems (such as CVE-2025-43914 "high") or even execute malicious code.

Videos by heise

If an attacker already has high user rights, they can upgrade to root user (CVE-2025-43890 "medium") and thus completely compromise PCs. It is not yet known whether attackers are already attacking computers. Admins should ensure that one of the Dell PowerProtect Data domain versions equipped against the described attacks is installed:

  • 8.5.0.0
  • 8.4.0.0
  • 8.3.1.10
  • 7.10.1.70
  • 7.13.1.40

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.