CVE-2025-43909 — Use of a Broken or Risky Cryptographic Algorithm in Dell Powerprotect Data Domain With Data Domain Operating System Lts2023
Severity
7.5HIGHNVD
CNA3.7
EPSS
0.0%
top 88.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Description
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5dell/powerprotect_data_domain_with_data_domain_operating_system_of_feature_release7.7.1.0 — 8.4.0.0
▶CVEListV5dell/powerprotect_data_domain_with_data_domain_operating_system_lts20237.10.1.0 — 7.10.1.70
▶CVEListV5dell/powerprotect_data_domain_with_data_domain_operating_system_lts20247.13.1.0 — 7.13.1.40