Cyber Security News

Multiple Flaws in Dell PowerProtect Allow System Compromise

Dell has released a Critical Security Update (DSA-2025-022) for its PowerProtect Data Domain (DD) systems to address multiple vulnerabilities that could allow attackers to compromise affected systems.

These vulnerabilities, identified in various components and open-source dependencies, highlight the importance of timely patching to safeguard enterprise data protection environments.

Impact of the Disclosed Vulnerabilities

The vulnerabilities include seven classified as “Critical” severity—CVE-2024-33871CVE-2024-41110CVE-2024-38428CVE-2024-24790CVE-2024-37371CVE-2024-24577, and CVE-2018-6913—which may allow escalation of privileges, unauthorized system access, denial of service, or sensitive data exfiltration. 

Breakdown of Critical CVEs

  1. CVE-2024-33871: This vulnerability, found in Artifex Ghostscript, raises concerns over potential code execution risks. Exploitation could allow attackers to compromise the integrity of data and system security.
  2. CVE-2024-41110: A critical flaw in Docker could enable attackers to escape containerized environments, potentially gaining unauthorized access to host systems and modifying configurations.
  3. CVE-2024-38428: Located in GNU Wget, this vulnerability could be exploited to execute malicious scripts or compromise data downloads, posing a serious threat to the system.
  4. CVE-2024-24790: Found in the HTTP protocol library, this issue allows attackers to launch denial-of-service or man-in-the-middle attacks on the system.
  5. CVE-2024-37371: Within the Kerberos krb5 library, this flaw allows attackers to bypass authentication mechanisms, potentially compromising system access controls.
  6. CVE-2024-24577: A vulnerability in libgit2, this issue could lead to remote code execution or repository tampering.
  7. CVE-2018-6913: Related to Perl, this vulnerability impacts older dependencies still used in the ecosystem, exposing systems to arbitrary code execution risks.

Affected Products

The vulnerabilities impact multiple Dell PowerProtect DD systems. Organizations using these systems are urged to review Dell’s official advisory (DSA-2025-022) to identify specific affected models and implement the recommended patches.

Dell has released security patches to address these vulnerabilities. Administrators are advised to:

  • Immediately apply the corresponding updates from Dell’s official support portal.
  • Review their system environments for signs of exploitation.
  • Monitor vendor notifications for possible future updates.

The discovery of critical vulnerabilities in enterprise backup and recovery products like Dell PowerProtect DD underscores the need for constant vigilance and timely patch management.

Organizations relying on these systems must act swiftly to mitigate risks and ensure data security.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Manipulate Users Into Running PowerShell as Admin to Exploit Windows

Microsoft Threat Intelligence has exposed a novel cyberattack method employed by the North Korean state-sponsored…

1 hour ago

Windows Driver Zero-Day Vulnerability Let Hackers Remotely Gain System Access

Microsoft has confirmed the discovery of a significant zero-day vulnerability, tracked as CVE-2025-21418, in the Windows…

1 hour ago

FortiOS & FortiProxy Vulnerability Allows Attackers Firewall Hijacks to Gain Super Admin Access

A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers to…

3 hours ago

Fortinet’s FortiOS Vulnerabilities Allow Attackers Trigger RCE and Launch DoS Attack

Fortinet’s FortiOS, the operating system powering its VPN and firewall appliances, has been found vulnerable…

3 hours ago

0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.…

4 hours ago

Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks

A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity community…

4 hours ago