CVE-2025-43909Use of a Broken or Risky Cryptographic Algorithm in Dell Powerprotect Data Domain With Data Domain Operating System Lts2023

Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

🔴Vulnerability Details

2
CVEList
CVE-2025-43909: Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 72025-10-07
GHSA
GHSA-4385-fv44-v5jx: Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 72025-10-07

📋Vendor Advisories

1
Microsoft
drm/amdgpu/pm: Fix the null pointer dereference for smu72024-08-13
CVE-2025-43909 — Dell vulnerability | cvebase