CVE-2025-43914

Dell · Dell PowerProtect Data Domain BoostFS

A high-severity vulnerability has been identified in Dell PowerProtect Data Domain BoostFS for Linux Ubuntu systems.

Executive summary

A high-severity vulnerability has been identified in Dell PowerProtect Data Domain BoostFS for Linux Ubuntu systems. This flaw could allow an attacker with local access to a system to escalate their privileges, potentially gaining complete control over the affected server. Successful exploitation could lead to unauthorized access to sensitive backup data, system compromise, and disruption of critical data protection services.

Vulnerability

This vulnerability is a local privilege escalation flaw within the Dell PowerProtect Data Domain BoostFS service on affected Linux Ubuntu systems. The BoostFS daemon fails to properly sanitize user-supplied input when handling specific file system operations. A low-privileged local attacker can craft a malicious request to the BoostFS service, triggering a buffer overflow that can be leveraged to execute arbitrary code with the privileges of the root user, leading to a full system compromise.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a significant business impact, as PowerProtect Data Domain systems are critical for an organization's data backup and disaster recovery capabilities. A successful attack could lead to the theft or modification of sensitive backup data, ransomware deployment, or a complete loss of data integrity. Compromise of these systems could also provide a foothold for attackers to move laterally across the network, escalating the scope of the breach and disrupting business continuity.

Remediation

Immediate Action: Apply the security updates provided by Dell to all affected systems immediately. Prioritize patching systems that host critical backup data or are accessible by a broad user base. After patching, review system and application logs for any signs of compromise that may have occurred prior to remediation.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for unusual processes running with root privileges, unexpected modifications to critical system files, and anomalous login activity in system logs (e.g., /var/log/auth.log and syslog). Monitor for any crashes or unexpected restarts of the BoostFS service, as this could indicate failed exploitation attempts.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict interactive shell access to affected systems to only trusted administrative accounts. Implement application whitelisting to prevent the execution of unauthorized code and enable a File Integrity Monitoring (FIM) solution to detect unauthorized changes to system binaries and configurations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity rating and the critical role of the affected software in data protection, we strongly recommend that organizations prioritize the immediate application of the vendor-supplied security updates. A compromise of a data protection system can have catastrophic consequences for business operations and data security. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high CVSS score and the potential for complete system takeover make it a prime target for future exploitation.