5.3

CVE-2025-43913

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DDOS. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorDell
Product PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release
Default Statusunaffected
Version < 8.4.0.0
Version 7.7.1.0
Status affected
VendorDell
Product PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2025
Default Statusunaffected
Version < 8.3.1.10
Version 8.3.1.0
Status affected
VendorDell
Product PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024
Default Statusunaffected
Version < 7.13.1.40
Version 7.13.1.0
Status affected
VendorDell
Product PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023
Default Statusunaffected
Version < 7.10.1.70
Version 7.10.1.0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.042
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security_alert@emc.com 5.3 1.6 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.