6.5
CVE-2025-43913
- EPSS 0.04%
- Veröffentlicht 07.10.2025 18:54:46
- Zuletzt bearbeitet 14.10.2025 20:09:06
- Quelle security_alert@emc.com
- CVE-Watchlists
- Unerledigt
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dell ≫ Data Domain Operating System Version >= 7.7.1.0 < 7.10.1.70
Dell ≫ Data Domain Operating System Version >= 7.13.1.0 < 7.13.1.40
Dell ≫ Data Domain Operating System Version >= 8.3.0.0 <= 8.3.0.15
Dell ≫ Data Domain Operating System Version >= 8.3.1.0 < 8.3.1.10
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.134 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
| security_alert@emc.com | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.