Cyber Security News

Multiple Flaws in Dell PowerProtect Allow System Compromise

Dell has released a Critical Security Update (DSA-2025-022) for its PowerProtect Data Domain (DD) systems to address multiple vulnerabilities that could allow attackers to compromise affected systems.

These vulnerabilities, identified in various components and open-source dependencies, highlight the importance of timely patching to safeguard enterprise data protection environments.

Impact of the Disclosed Vulnerabilities

The vulnerabilities include seven classified as “Critical” severity—CVE-2024-33871CVE-2024-41110CVE-2024-38428CVE-2024-24790CVE-2024-37371CVE-2024-24577, and CVE-2018-6913—which may allow escalation of privileges, unauthorized system access, denial of service, or sensitive data exfiltration. 

Breakdown of Critical CVEs

  1. CVE-2024-33871: This vulnerability, found in Artifex Ghostscript, raises concerns over potential code execution risks. Exploitation could allow attackers to compromise the integrity of data and system security.
  2. CVE-2024-41110: A critical flaw in Docker could enable attackers to escape containerized environments, potentially gaining unauthorized access to host systems and modifying configurations.
  3. CVE-2024-38428: Located in GNU Wget, this vulnerability could be exploited to execute malicious scripts or compromise data downloads, posing a serious threat to the system.
  4. CVE-2024-24790: Found in the HTTP protocol library, this issue allows attackers to launch denial-of-service or man-in-the-middle attacks on the system.
  5. CVE-2024-37371: Within the Kerberos krb5 library, this flaw allows attackers to bypass authentication mechanisms, potentially compromising system access controls.
  6. CVE-2024-24577: A vulnerability in libgit2, this issue could lead to remote code execution or repository tampering.
  7. CVE-2018-6913: Related to Perl, this vulnerability impacts older dependencies still used in the ecosystem, exposing systems to arbitrary code execution risks.

Affected Products

The vulnerabilities impact multiple Dell PowerProtect DD systems. Organizations using these systems are urged to review Dell’s official advisory (DSA-2025-022) to identify specific affected models and implement the recommended patches.

Dell has released security patches to address these vulnerabilities. Administrators are advised to:

  • Immediately apply the corresponding updates from Dell’s official support portal.
  • Review their system environments for signs of exploitation.
  • Monitor vendor notifications for possible future updates.

The discovery of critical vulnerabilities in enterprise backup and recovery products like Dell PowerProtect DD underscores the need for constant vigilance and timely patch management.

Organizations relying on these systems must act swiftly to mitigate risks and ensure data security.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector emerged…

10 hours ago

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its attacks…

10 hours ago

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6 million…

11 hours ago

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect servers…

12 hours ago

Healthcare Sector Becomes a Major Target for Cyber Attacks in 2025

The healthcare sector has emerged as a prime target for cyber attackers, driven by the…

13 hours ago

SysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution

Security researchers have disclosed a chain of critical vulnerabilities affecting SysAid ITSM’s On-Premise solution, enabling…

13 hours ago