{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-43909","assignerOrgId":"c550e75a-17ff-4988-97f0-544cde3820fe","state":"PUBLISHED","assignerShortName":"dell","dateReserved":"2025-04-19T05:03:41.169Z","datePublished":"2025-10-07T19:11:18.767Z","dateUpdated":"2025-10-07T19:27:32.584Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release","vendor":"Dell","versions":[{"lessThan":"8.4.0.0","status":"affected","version":"7.7.1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2025","vendor":"Dell","versions":[{"lessThan":"8.3.1.10","status":"affected","version":"8.3.1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024","vendor":"Dell","versions":[{"lessThan":"7.13.1.40","status":"affected","version":"7.13.1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023","vendor":"Dell","versions":[{"lessThan":"7.10.1.70","status":"affected","version":"7.10.1.0","versionType":"semver"}]}],"datePublic":"2025-10-01T17:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure."}],"value":"Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Use of a Broken or Risky Cryptographic Algorithm vulnerability in the DD boost. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information exposure."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.7,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-327","description":"CWE-327: Use of a Broken or Risky Cryptographic Algorithm","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c550e75a-17ff-4988-97f0-544cde3820fe","shortName":"dell","dateUpdated":"2025-10-07T19:11:18.767Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.dell.com/support/kbdoc/en-us/000376224/dsa-2025-333-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-07T19:27:00.531743Z","id":"CVE-2025-43909","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-07T19:27:32.584Z"}}]}}