CVE-2026-23775 Overview
CVE-2026-23775 is a sensitive information disclosure vulnerability affecting Dell PowerProtect Data Domain appliances running the Data Domain Operating System (DD OS). The vulnerability involves the insertion of sensitive information into log files (CWE-532), which could allow a low-privileged attacker with remote network access to extract credentials from system logs. This vulnerability specifically impacts systems with retention lock enabled.
Critical Impact
Credential exposure through log files could enable unauthorized access to Dell PowerProtect Data Domain appliances, potentially compromising backup infrastructure and data protection systems.
Affected Products
- Dell Data Domain Operating System Feature Release versions 8.0 through 8.5
- Dell Data Domain Operating System LTS2025 release versions 8.3.1.0 through 8.3.1.10
- Dell PowerProtect Data Domain appliances with retention lock enabled
Discovery Timeline
- 2026-04-17 - CVE-2026-23775 published to NVD
- 2026-04-20 - Last updated in NVD database
Technical Details for CVE-2026-23775
Vulnerability Analysis
This vulnerability stems from improper handling of sensitive data during logging operations within the Dell Data Domain Operating System. When certain authentication or system operations occur, the DD OS inadvertently writes sensitive credential information to log files that are accessible to users with lower privilege levels.
The vulnerability requires an attacker to have low-level authenticated access to the system and can be exploited remotely over the network. However, successful exploitation also requires user interaction, as authentication attempts using any compromised credentials must still be authorized by a high-privileged DD user. This limitation reduces the immediate exploitability but does not eliminate the risk of credential harvesting.
It is important to note that this vulnerability only affects Dell PowerProtect Data Domain systems where the retention lock feature is enabled. Organizations not using retention lock are not impacted by this specific issue.
Root Cause
The root cause of CVE-2026-23775 is classified as CWE-532: Insertion of Sensitive Information into Log File. The DD OS logging subsystem fails to properly sanitize or redact sensitive credential data before writing to system logs. This violates secure coding practices that mandate sensitive information such as passwords, tokens, and authentication credentials should never be logged in plaintext or recoverable formats.
Attack Vector
The attack vector for CVE-2026-23775 is network-based, requiring the attacker to have remote access to the Dell PowerProtect Data Domain appliance. The exploitation scenario involves:
- An attacker gains low-privileged remote access to the DD OS
- The attacker accesses system log files that contain inadvertently logged credentials
- The attacker extracts sensitive authentication information from log entries
- The compromised credentials could be used in subsequent attacks, though such attempts would need authorization from a high-privileged DD user
The vulnerability manifests in the logging mechanism of the Data Domain Operating System when retention lock is enabled. When specific operations are performed, sensitive credential data is written to log files without proper redaction. Attackers with read access to these log files can parse and extract the exposed credentials. For detailed technical information, refer to the Dell Security Update Advisory.
Detection Methods for CVE-2026-23775
Indicators of Compromise
- Unusual log file access patterns by low-privileged user accounts
- Multiple read operations on system log files from unexpected sources
- Authentication attempts using credentials that may have been extracted from logs
- Anomalous network connections from DD OS systems to external destinations
Detection Strategies
- Implement file integrity monitoring on DD OS log directories to detect unauthorized access
- Monitor for unusual read access to system logs by non-administrative accounts
- Correlate authentication logs with log file access events to identify potential credential harvesting
- Deploy SIEM rules to alert on suspicious log parsing activities
Monitoring Recommendations
- Enable audit logging for all log file access on Dell PowerProtect Data Domain appliances
- Configure alerting for failed authentication attempts that may indicate use of harvested credentials
- Monitor user session activities, particularly those involving log file browsing or export
- Review DD OS system logs regularly for indications of unauthorized credential access
How to Mitigate CVE-2026-23775
Immediate Actions Required
- Review the Dell Security Update Advisory for specific patch guidance
- Identify all Dell PowerProtect Data Domain appliances running affected DD OS versions (8.0 through 8.5 and LTS2025 8.3.1.0 through 8.3.1.10)
- Assess which systems have retention lock enabled, as only these are vulnerable
- Restrict log file access permissions to essential administrative accounts only
- Consider credential rotation for accounts that may have been exposed in logs
Patch Information
Dell has released security updates to address this vulnerability. Organizations should consult the Dell Security Advisory DSA-2026-060 for detailed patch installation instructions and updated DD OS versions. Apply the vendor-provided patches as soon as possible after testing in a non-production environment.
Workarounds
- Restrict access to DD OS log files by implementing strict file permission controls
- Limit remote access to PowerProtect Data Domain appliances to only essential personnel
- Implement network segmentation to restrict access to DD OS management interfaces
- Enable enhanced logging and monitoring to detect potential exploitation attempts
# Review current log file permissions on DD OS
# Restrict access to log directories to administrative users only
# Note: Consult Dell documentation for exact commands applicable to your DD OS version
# Example: Check current user access levels
# ddsh -c "user show"
# Example: Review system log access
# ddsh -c "log list"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

