Skip to content
Threat Feed
critical advisory

Dell PowerProtect Data Domain Command Injection Vulnerability (CVE-2026-23778)

A command injection vulnerability in Dell PowerProtect Data Domain (CVE-2026-23778) could allow a remote, high-privileged attacker to gain root-level access.

CVE-2026-23778 is a command injection vulnerability affecting Dell PowerProtect Data Domain appliances running Data Domain Operating System (DD OS). The affected versions include Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, and LTS2024 release versions 7.13.1.0 through 7.13.1.50. A remote attacker with high privileges could exploit this vulnerability to execute arbitrary commands with root privileges on the affected system. Successful exploitation would grant the attacker complete control over the Data Domain appliance, potentially leading to data loss, system compromise, and disruption of backup and recovery operations. Due to the critical role of Data Domain appliances in data protection, this vulnerability poses a significant risk to organizations using affected versions.

Attack Chain

  1. The attacker gains high-privileged remote access to the Dell PowerProtect Data Domain appliance, likely through compromised credentials or a separate vulnerability.
  2. The attacker crafts a malicious HTTP request containing a command injection payload targeting a vulnerable endpoint within the DD OS web management interface.
  3. The vulnerable endpoint fails to properly sanitize user-supplied input, allowing the attacker to inject arbitrary operating system commands into the system.
  4. The injected command is executed with the privileges of the webserver process, which in this case, runs with root privileges.
  5. The attacker leverages the initial command execution to establish persistence on the system, such as creating a new user account or modifying system configuration files.
  6. The attacker uses the gained root access to move laterally within the Data Domain appliance, potentially accessing sensitive data or compromising other services.
  7. The attacker could exfiltrate sensitive data, deploy ransomware, or disrupt backup operations depending on their objectives.

Impact

Successful exploitation of CVE-2026-23778 grants a remote attacker complete control over the Dell PowerProtect Data Domain appliance. This can lead to severe consequences, including unauthorized access to sensitive data, data corruption, disruption of backup and recovery processes, and potential ransomware deployment. Given the Data Domain’s central role in data protection strategies, a successful attack can have a widespread impact, affecting numerous systems and applications that rely on the backup infrastructure.

Recommendation

Detection coverage 2

Detect Web Requests to Dell PowerProtect Systems

info

Detects HTTP requests to Dell PowerProtect systems, which can be used to detect exploitation attempts.

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detect Command Injection Attempts in Web Requests

high

Detects common command injection attempts within HTTP requests, which could indicate exploitation of CVE-2026-23778.

sigma tactics: execution techniques: T1059.004, T1190 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

url

TypeValue
urlhttps://www.dell.com/support/kbdoc/en-us/000450699/dsa-2026-060-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities