Dell PowerProtect Data Domain OS Critical Vulnerabilities
Summary
CERT-Bund issued security advisory WID-SEC-2026-1118 warning of multiple critical vulnerabilities in Dell PowerProtect Data Domain OS with CVSS Base Score 8.8 (High). Affected versions include OS builds prior to 8.7.0.0, 8.7.0.1, 8.3.1.30, 7.13.1.70, 8.6.0.0, 8.3.1.20, and 7.13.1.60. Remote attackers can exploit these flaws to execute arbitrary code with root privileges, escalate privileges to administrator level, bypass security controls, manipulate data, or disclose confidential information.
What changed
CERT-Bund published security advisory WID-SEC-2026-1118 identifying multiple critical vulnerabilities in Dell PowerProtect Data Domain Operating System. The CVSS Base Score is 8.8 (High) with a Temporal Score of 7.7 (High). The vulnerabilities allow remote attackers to execute arbitrary code with root privileges, gain elevated permissions including administrator access, bypass security controls, manipulate data, and disclose confidential information.
Organizations using Dell PowerProtect Data Domain appliances should immediately identify which OS versions are deployed and apply available patches or mitigations. This advisory is relevant for any entity relying on these systems for data protection and backup infrastructure, particularly in environments requiring high security assurance.
What to do next
- Review Dell PowerProtect Data Domain OS versions in use
- Apply available patches to affected systems
- Implement recommended mitigations from the advisory
Archived snapshot
Apr 15, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1118] Dell PowerProtect Data Domain OS: Mehrere Schwachstellen CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 14.04.2026 Stand 15.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
Produktbeschreibung
Dell PowerProtect Data Domain Operating System (DD OS) ist das Betriebssystem für die PowerProtect Data Domain Appliances von Dell.
Produkte
14.04.2026
- Dell PowerProtect Data Domain OS <8.7.0.0
Dell PowerProtect Data Domain OS <8.7.0.1
Dell PowerProtect Data Domain OS <8.3.1.30
Dell PowerProtect Data Domain OS <7.13.1.70
Dell PowerProtect Data Domain OS <8.6.0.0
Dell PowerProtect Data Domain OS <8.3.1.20
Dell PowerProtect Data Domain OS <7.13.1.60
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain OS ausnutzen, um beliebigen Code auszuführen – sogar mit Root-Rechten –, um erweiterte Rechte zu erlangen – einschließlich Administratorrechte –, um Sicherheitsmaßnahmen zu umgehen, um Daten zu manipulieren, um vertrauliche Informationen offenzulegen oder um andere, nicht näher spezifizierte Angriffe durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.