CVE-2025-36594
Dell · Dell PowerProtect Data Domain with Data Domain Operating System Multiple Products
A critical vulnerability has been identified in Dell PowerProtect Data Domain systems, which could allow a remote, unauthenticated attacker to gain complete control over the affected appliance.
Executive summary
A critical vulnerability has been identified in Dell PowerProtect Data Domain systems, which could allow a remote, unauthenticated attacker to gain complete control over the affected appliance. Successful exploitation could lead to the total loss or theft of an organization's backup data, severely impacting disaster recovery capabilities and posing a significant risk to business continuity.
Vulnerability
This vulnerability is a remote code execution (RCE) flaw in a core service of the Data Domain Operating System. An unauthenticated attacker on the same network as the appliance can send a specially crafted network request to a vulnerable port. This request can trigger a memory corruption error, allowing the attacker to execute arbitrary code on the system with the highest level of privileges, leading to a complete system compromise without any user interaction.
Business impact
This vulnerability is rated as critical with a CVSS score of 9.8. Exploitation would result in a complete compromise of the Dell PowerProtect Data Domain appliance, which serves as a cornerstone of an organization's data protection and recovery strategy. An attacker could delete, encrypt, or exfiltrate all backup data, making it impossible to recover from a ransomware attack or other catastrophic event. Furthermore, the compromised backup appliance could be used as a secure foothold to launch further attacks across the internal network, posing an existential risk to data confidentiality, integrity, and availability.
Remediation
Immediate Action: Immediately apply the security patches provided by Dell to all affected systems. Prioritize patching for any systems that may be accessible from less trusted network zones. Before and after applying the update, it is crucial to monitor for any signs of exploitation and thoroughly review system and access logs for indicators of compromise.
Proactive Monitoring: Security teams should implement enhanced monitoring of network traffic to and from the Data Domain management interfaces, looking for unusual patterns or connection attempts from unauthorized sources. Review system logs for unexpected reboots, new user account creation, or the execution of suspicious processes. Configure security information and event management (SIEM) systems to alert on any activity related to this vulnerability.
Compensating Controls: If immediate patching is not possible, implement strict network segmentation to isolate the PowerProtect Data Domain appliances. Use firewalls and network access control lists (ACLs) to restrict all access to the management interfaces, allowing connections only from a small set of authorized administrative workstations. Ensure the appliance is not directly exposed to the internet.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Due to the critical severity of this vulnerability, immediate action is required. A successful exploit would provide an attacker with complete control over an organization's backup infrastructure, representing a catastrophic risk to business operations and data security. Although CVE-2025-36594 is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion. We strongly recommend that all organizations using the affected Dell products prioritize the deployment of the vendor-supplied security updates without delay.