Numerous attacks on Dell PowerProtect Data Domain possible

In current versions of Dell PowerProtect Data Domain, developers have closed vulnerabilities.

listen Print view
A symbolic update bar is filling up.

(Image: AFANASEV IVAN/Shutterstock.com)

2 min. read

Actually, Dell PowerProtect Data Domain is supposed to protect data in on-premise and multi-cloud environments. However, due to numerous security vulnerabilities, attackers can attack instances.

As a security advisory indicates, the now-closed vulnerabilities are in components such as Apache Commons FileUpload and OpenSSL, which PowerProtect Data Domain uses. However, the application is also vulnerable itself. The developers assure that they have resolved the security issues in versions 7.13.1.70, 8.3.1.30, 8.6.1.10, and 8.7.0.1.

The majority of the closed vulnerabilities are classified with the threat level “high.” For example, attackers can exploit a DoS vulnerability (CVE-2025-48976) in Apache Commons FileUpload to trigger crashes. However, there are also “critical” vulnerabilities. For instance, malicious code can enter systems via an SQLite vulnerability (CVE-2025-6965).

PowerProtect Data Domain is vulnerable, among other things, via a root security vulnerability (CVE-2026-26944 “high”). Because authentication is missing for critical functions, attackers can remotely exploit the vulnerability and execute malicious code with root privileges. In such a case, a complete compromise of a system is to be expected. Thirteen additional root vulnerabilities have been closed.

Videos by heise

Additionally, attackers can access instances due to insufficiently protected credentials (CVE-2025-36568 “high”). So far, Dell has no indication that attackers are already exploiting the vulnerabilities. However, since that can change quickly, administrators should not delay patching.

Most recently, in March, Dell closed several security vulnerabilities in Dell Secure Connect Gateway Policy Manager.

❌ Missing, not defective, authentication × Dell describes CVE-2026-26944 as missing authentication for critical functions, meaning authentication is completely missing for certain critical functions. “Defective” incorrectly implies that authentication exists but is flawed. Insert: Because authentication is missing for critical functions ✅ Accept × Reject (des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.