6.5
CVE-2025-43907
- EPSS 0.06%
- Veröffentlicht 07.10.2025 18:14:36
- Zuletzt bearbeitet 14.10.2025 20:10:36
- Quelle security_alert@emc.com
- CVE-Watchlists
- Unerledigt
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain a Path Traversal: '.../...//' vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dell ≫ Data Domain Operating System Version >= 7.7.1.0 < 7.10.1.70
Dell ≫ Data Domain Operating System Version >= 7.13.1.0 < 7.13.1.40
Dell ≫ Data Domain Operating System Version >= 8.3.0.0 <= 8.3.0.15
Dell ≫ Data Domain Operating System Version >= 8.3.1.0 < 8.3.1.10
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.183 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security_alert@emc.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-35 Path Traversal: '.../...//'
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.