Cyber Posture

CVE-2025-36594

Critical

Published: 04 August 2025

Published
04 August 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0042 61.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-36594 is a critical-severity Authentication Bypass by Spoofing (CWE-290) vulnerability in Dell Data Domain Operating System. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 38.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-17 (Remote Access).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely patching of the authentication bypass vulnerability as provided in Dell DSA-2025-159 directly remediates the flaw, preventing remote unauthenticated exploitation.

AC-17 Remote Access partial match
preventdetect

Authorizes, monitors, and restricts remote access to the Data Domain system, mitigating unauthenticated remote attacker exploitation of the spoofing vulnerability.

prevent

Enforces identification and authentication for non-organizational users, countering spoofing-based authentication bypass by remote attackers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1136.001 Local Account Persistence
Adversaries may create a local account to maintain access to victim systems.
Why these techniques?

Remote unauthenticated auth bypass on public-facing Dell appliance directly enables T1190 exploitation and subsequent local account creation via T1136.001.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Authentication Bypass by Spoofing vulnerability. An unauthenticated…

more

attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Remote unauthenticated user can create account that potentially expose customer info, affect system integrity and availability.

Deeper analysisAI

CVE-2025-36594 is an Authentication Bypass by Spoofing vulnerability (CWE-290) affecting Dell PowerProtect Data Domain systems running Data Domain Operating System (DD OS). The issue impacts Feature Release versions 7.7.1.0 through 8.3.0.15, LTS 2024 release versions 7.13.1.0 through 7.13.1.25, and LTS 2023 release versions 7.10.1.0 through 7.10.1.60. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high confidentiality, integrity, and availability impacts.

An unauthenticated attacker with remote network access can exploit this vulnerability to bypass authentication and protection mechanisms. Successful exploitation allows the attacker to create accounts, potentially exposing customer information and compromising system integrity and availability.

Dell Security Advisory DSA-2025-159 addresses this and other vulnerabilities in PowerProtect Data Domain, providing security updates for mitigation. Security practitioners should consult the advisory at https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities for patching details and apply updates to affected versions.

Details

CWE(s)

Affected Products

dell
data domain operating system
7.7.1.0 — 7.10.1.70 · 7.13.1.0 — 7.13.1.30 · 8.0.0.0 — 8.3.1.0

CVEs Like This One

CVE-2025-22475Same product: Dell Data Domain Operating System
CVE-2025-46645Same product: Dell Data Domain Operating System
CVE-2026-23775Same product: Dell Data Domain Operating System
CVE-2025-36568Same product: Dell Data Domain Operating System
CVE-2024-51534Same product: Dell Data Domain Operating System
CVE-2024-53295Same product: Dell Data Domain Operating System
CVE-2026-26944Same product: Dell Data Domain Operating System
CVE-2026-26354Same product: Dell Data Domain Operating System
CVE-2026-23774Same product: Dell Data Domain Operating System
CVE-2026-23776Same product: Dell Data Domain Operating System

References