

PoC Released for Critical Linux Kernel Bug Allowing Local Privilege Escalation
April 7, 2025
RedLine Stealer – Active IOCs
April 7, 2025
PoC Released for Critical Linux Kernel Bug Allowing Local Privilege Escalation
April 7, 2025
RedLine Stealer – Active IOCs
April 7, 2025Severity
High
Analysis Summary
A critical vulnerability, tracked as CVE-2025-29987, has been discovered in Dell Technologies' PowerProtect Data Domain systems, posing a serious security threat to enterprise backup and recovery infrastructure. This high-severity flaw, with a CVSS v3.1, affects several versions of the Data Domain Operating System (DD OS) prior to 8.3.0.15.
According to the Researcher, vulnerability arises from insufficient granularity of access controls, allowing an authenticated, low-privileged user from a trusted remote client to execute arbitrary commands with root privileges, essentially giving them full control over affected systems. This could lead to data loss, malware injection, or lateral movement within enterprise networks.
The vulnerability impacts a wide array of Dell products, including PowerProtect Data Domain appliances, Virtual Edition, APEX Protection Storage, PowerProtect DP Series Appliance (IDPA) (versions 2.7.6–2.7.8), and Disk Library for mainframe DLm8500 and DLm8700. Affected DD OS versions include 7.7.1.0 to 8.3.0.10, 7.13.1.0 to 7.13.1.20, and 7.10.1.0 to 7.10.1.50. The exploitability score of 2.8 and an impact score of 5.9 indicate the flaw's high risk if not promptly mitigated.
To address the issue, Dell has released patched versions: DD OS 8.3.0.15, 7.13.1.25, and 7.10.1.60 for their respective product lines. For IDPA systems, upgrading to include DD OS 7.10.1.60 is necessary, while the Disk Library for mainframe requires updates to Version 5.4.0.0 or later for DLm8500, and Version 7.0.0.0 or later for DLm8700. Dell has been actively updating its security advisories, with six revisions between April 2 and 4, 2025, offering step-by-step upgrade instructions and clarifications.
This is not the first time Dell’s backup infrastructure has faced severe vulnerabilities; past issues, such as CVE-2023-44277 and CVE-2024-22445, also enabled command execution risks. However, CVE-2025-29987 is especially concerning due to the elevated privileges granted upon exploitation. Organizations using vulnerable systems—especially those handling sensitive or regulated data—must prioritize patching immediately to prevent exploitation, data breaches, and further security compromise.
Impact
- Data Loss
- Unauthorized Access
- Privilege Escalation
- Gain Access
Indicators of Compromise
CVE
CVE-2025-29987
CVE-2023-44277
CVE-2024-22445
Affected Vendors
- Dell
Affected Products
- Dell DD OS 8.3 - 7.7.1.0
- Dell DD OS 7.13 - 7.13.1.0
- Dell DD OS 7.10 - 7.10.1.0
- Dell PowerProtect DP Series Appliance (IDPA) - N/A
Remediation
- Refer to the Dell Security Advisory for patch, upgrade, or suggested workaround information.
- Upgrade Data Domain Operating System (DD OS) to a Safe Version.
- For PowerProtect DP Series Appliances (IDPA) versions 2.7.6, 2.7.7, and 2.7.8, integrate DD OS 7.10.1.60 into your system..
- Schedule downtime or maintenance windows for patching critical systems.
- Perform testing on non-production environments before rolling out to live infrastructure.
- Review user privileges and access logs for signs of misuse.
- Implement enhanced monitoring for unusual command executions or privilege escalations.