CVE-2025-36594 Overview
CVE-2025-36594 is a critical Authentication Bypass by Spoofing vulnerability affecting Dell PowerProtect Data Domain systems running the Data Domain Operating System (DD OS). This vulnerability allows unauthenticated remote attackers to bypass authentication mechanisms, potentially leading to unauthorized account creation and compromise of customer data, system integrity, and availability.
The vulnerability exists across multiple DD OS release branches, making it a widespread security concern for organizations relying on Dell PowerProtect Data Domain for enterprise backup and data protection solutions.
Critical Impact
Remote unauthenticated attackers can exploit this vulnerability to create unauthorized accounts, potentially exposing sensitive customer information and affecting both system integrity and availability of backup infrastructure.
Affected Products
- Dell Data Domain Operating System Feature Release versions 7.7.1.0 through 8.3.0.15
- Dell Data Domain Operating System LTS2024 release versions 7.13.1.0 through 7.13.1.25
- Dell Data Domain Operating System LTS 2023 release versions 7.10.1.0 through 7.10.1.60
Discovery Timeline
- 2025-08-04 - CVE-2025-36594 published to NVD
- 2025-10-16 - Last updated in NVD database
Technical Details for CVE-2025-36594
Vulnerability Analysis
This Authentication Bypass by Spoofing vulnerability (CWE-290) exists within the Dell PowerProtect Data Domain Operating System's authentication subsystem. The flaw allows remote attackers to circumvent security controls without requiring any prior authentication or user interaction.
The vulnerability is particularly dangerous because it enables attackers to create unauthorized user accounts on affected systems. These accounts can then be leveraged to access sensitive customer backup data, modify system configurations, or disrupt data protection operations. Given that Data Domain appliances are commonly deployed as enterprise backup targets, successful exploitation could compromise an organization's entire backup infrastructure.
Root Cause
The root cause stems from improper validation of authentication credentials or identity assertions within the DD OS. The system fails to properly verify the authenticity of incoming authentication requests, allowing attackers to spoof legitimate authentication mechanisms. This weakness in the authentication verification process enables unauthenticated users to gain access to protected functionality.
Attack Vector
The attack can be executed remotely over the network without requiring any privileges or user interaction. An attacker with network access to an affected Dell PowerProtect Data Domain system can exploit this vulnerability by:
- Identifying a vulnerable DD OS instance accessible over the network
- Crafting spoofed authentication requests that bypass the authentication mechanism
- Creating unauthorized user accounts on the target system
- Leveraging the created accounts to access customer data or modify system configuration
The vulnerability mechanism involves improper validation of authentication assertions within the DD OS authentication subsystem. When processing authentication requests, the system fails to adequately verify the identity of the requester, allowing spoofed credentials to be accepted. For detailed technical information, refer to the Dell Security Update Advisory.
Detection Methods for CVE-2025-36594
Indicators of Compromise
- Unexpected user accounts created on Data Domain systems that were not authorized by administrators
- Authentication logs showing successful logins from unknown IP addresses or unexpected geographic locations
- System audit logs indicating configuration changes made by unrecognized user accounts
- Unusual network traffic patterns to Data Domain management interfaces
Detection Strategies
- Implement continuous monitoring of user account creation events on all Data Domain appliances
- Deploy network intrusion detection signatures to identify authentication bypass attempts targeting DD OS
- Configure SIEM alerts for authentication anomalies including logins from unauthorized sources
- Perform regular audits of user accounts and access permissions on Data Domain systems
Monitoring Recommendations
- Enable verbose logging on all Data Domain system authentication events
- Monitor network traffic to management interfaces (typically ports 22, 443, and custom management ports)
- Implement baseline analysis to detect deviations in normal authentication patterns
- Configure alerting for any new account creation or privilege escalation events
How to Mitigate CVE-2025-36594
Immediate Actions Required
- Identify all Dell PowerProtect Data Domain systems in your environment running affected DD OS versions
- Review existing user accounts on affected systems for any unauthorized entries
- Restrict network access to Data Domain management interfaces to trusted administrative networks only
- Apply the security patches provided by Dell as soon as possible following change management procedures
Patch Information
Dell has released security updates to address this vulnerability. Organizations should apply the appropriate patches based on their DD OS release branch:
- For Feature Release versions: Update to a version beyond 8.3.0.15
- For LTS2024 release: Update to a version beyond 7.13.1.25
- For LTS 2023 release: Update to a version beyond 7.10.1.60
Detailed patch information and download links are available in the Dell Security Update Advisory.
Workarounds
- Implement strict network segmentation to isolate Data Domain management interfaces from untrusted networks
- Deploy firewall rules to restrict access to Data Domain systems only from authorized management workstations
- Enable additional authentication factors where supported by your environment
- Monitor all authentication attempts and user account changes until patches can be applied
# Example: Restrict management interface access via firewall rules
# Limit SSH access to Data Domain from specific management network
iptables -A INPUT -p tcp --dport 22 -s 10.10.0.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP
# Limit HTTPS management access from specific management network
iptables -A INPUT -p tcp --dport 443 -s 10.10.0.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

