Dell PowerProtect Data Domain: Critical Weak Credentials Vulnerability

Dell PowerProtect Data Domain: Critical Weak Credentials Vulnerability

The National Vulnerability Database (NVD) has disclosed CVE-2026-23853, a high-severity use of weak credentials vulnerability impacting Dell PowerProtect Data Domain with Data Domain Operating System (DD OS). Specifically, feature release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, and LTS2024 release versions 7.13.1.0 through 7.13.1.50 are affected. This flaw carries a CVSS score of 8.4 (HIGH).

This isn’t a theoretical issue. An unauthenticated attacker with local access can exploit this vulnerability, potentially gaining unauthorized control over the system. The critical aspect here is the local access requirement – it points to an insider threat scenario or an attacker who has already achieved initial access through other means. Once local, the weak credentials provide a straightforward path to privilege escalation or lateral movement.

For defenders, this is a clear call to action. Dell PowerProtect Data Domain systems often hold an organization’s most critical data backups. Unauthorized access here could lead to data exfiltration, tampering, or even the deletion of backup sets, crippling recovery efforts during a ransomware attack or other disaster. The attacker’s calculus is simple: target the data that hurts the most when compromised.

What This Means For You

  • If your organization uses Dell PowerProtect Data Domain, specifically the DD OS versions listed, you need to prioritize this. Audit your systems for local access controls and ensure no weak or default credentials exist. This vulnerability allows unauthenticated local attackers to gain unauthorized system access. Patching is critical, but also review your internal segmentation and access policies to mitigate the impact of an attacker already on your network.

Indicators of Compromise

IDTypeIndicator
CVE-2026-23853 Vulnerability CVE-2026-23853
🔎
Dell Vulnerabilities & Breaches Use /org dell.com to see if Dell or its products have been recently implicated in breaches or vulnerabilities.
Open Intel Bot →

Related Posts

North Korean IT Scheme Facilitators Jailed in US Court

Two individuals, Kejia Wang and Zhenxing Wang, have been sentenced in the U.S. for their roles in a scheme that facilitated North Korean IT workers...

threat-intelvulnerability
/SCW Vulnerability Desk /MEDIUM

CVE-2026-6494 — The AAP MCP Server Vulnerability

CVE-2026-6494 — A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted...

vulnerabilityCVEmedium-severitycwe-117
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs

CVE-2026-6439 — Cross-Site Scripting (XSS)

CVE-2026-6439 — The VideoZen plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.0.1. This is due to insufficient...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs