Cyber Posture

CVE-2025-22475

Low

Published: 04 February 2025

Published
04 February 2025
Modified
07 February 2025
KEV Added
Patch
CVSS Score 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0018 39.4th percentile
Risk Priority 8 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22475 is a low-severity Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) vulnerability in Dell Data Domain Operating System. Its CVSS base score is 3.7 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-13 (Cryptographic Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates use of FIPS-validated cryptographic modules for protection, directly mitigating risky implementations of cryptographic primitives that enable tampering.

prevent

Requires timely remediation of flaws like CVE-2025-22475 through patching to upgraded versions, eliminating the vulnerability.

detect

Monitors for unauthorized changes to software and information, enabling detection of tampering resulting from exploitation of the cryptographic flaw.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote network-exploitable vulnerability in Dell PowerProtect DD system with no auth or interaction required directly enables T1190 for initial access via public-facing application exploitation; crypto weakness facilitates tampering impact.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell PowerProtect DD, versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.10 contains a use of a Cryptographic Primitive with a Risky Implementation vulnerability. A remote attacker could potentially exploit this vulnerability, leading to Information tampering.

Deeper analysisAI

CVE-2025-22475 is a use of a Cryptographic Primitive with a Risky Implementation vulnerability, associated with CWE-1240 and CWE-327, affecting Dell PowerProtect DD systems. The vulnerability impacts versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.10.

A remote attacker could potentially exploit this vulnerability over the network, with high attack complexity, no required privileges, and no user interaction. Successful exploitation could lead to information tampering, with a CVSS v3.1 base score of 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).

Dell's security advisory DSA-2025-022, available at https://www.dell.com/support/kbdoc/en-us/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities, details security updates for Dell PowerProtect DD that address this and other vulnerabilities, recommending upgrades to the specified fixed versions.

Details

CWE(s)

Affected Products

dell
data domain operating system
7.10.1.0 — 7.10.1.50 · 7.13.1.0 — 7.13.1.10 · 7.14.0.0 — 8.3.0.0

CVEs Like This One

CVE-2025-46645Same product: Dell Data Domain Operating System
CVE-2025-36594Same product: Dell Data Domain Operating System
CVE-2026-26944Same product: Dell Data Domain Operating System
CVE-2026-23775Same product: Dell Data Domain Operating System
CVE-2025-36568Same product: Dell Data Domain Operating System
CVE-2024-51534Same product: Dell Data Domain Operating System
CVE-2024-53295Same product: Dell Data Domain Operating System
CVE-2026-26354Same product: Dell Data Domain Operating System
CVE-2026-23774Same product: Dell Data Domain Operating System
CVE-2026-23776Same product: Dell Data Domain Operating System

References