<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2025-36568 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2025-36568/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 09:16:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2025-36568/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dell PowerProtect Data Domain BoostFS Credential Exposure Vulnerability (CVE-2025-36568)</title><link>https://feed.craftedsignal.io/briefs/2024-07-dell-powerprotect-credential-exposure/</link><pubDate>Fri, 17 Apr 2026 09:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-dell-powerprotect-credential-exposure/</guid><description>Dell PowerProtect Data Domain BoostFS versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50 are vulnerable to an insufficiently protected credentials vulnerability, allowing a low-privileged attacker with local access to expose credentials and potentially gain elevated privileges.</description><content:encoded><![CDATA[<p>CVE-2025-36568 affects Dell PowerProtect Data Domain BoostFS for client software, specifically Feature Release versions 7.7.1.0 through 8.5, LTS2025 release versions 8.3.1.0 through 8.3.1.20, and LTS2024 release versions 7.13.1.0 through 7.13.1.50. The vulnerability stems from insufficiently protected credentials, potentially allowing a low-privileged attacker with local system access to expose sensitive information. Successful exploitation could allow the attacker to access the system with the privileges associated with the compromised account. This vulnerability poses a significant risk to organizations using the affected software, as it can lead to unauthorized access and potential data breaches. Defenders should prioritize patching or mitigating this vulnerability to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privileged local access to a system running a vulnerable version of Dell PowerProtect Data Domain BoostFS.</li>
<li>Attacker identifies the location of the insufficiently protected credential files within the BoostFS installation.</li>
<li>Attacker leverages standard file system tools (e.g., <code>cat</code>, <code>type</code>, or a file explorer) to access and read the credential files.</li>
<li>The attacker extracts the exposed credentials from the files. These credentials could include usernames, passwords, API keys, or other sensitive information.</li>
<li>Attacker uses the compromised credentials to authenticate to the PowerProtect Data Domain system.</li>
<li>Upon successful authentication, the attacker gains access to the system with the privileges of the compromised account.</li>
<li>Attacker leverages their compromised account to escalate privileges further within the Data Domain system, potentially gaining administrative control.</li>
<li>Attacker uses compromised access to exfiltrate sensitive data, disrupt backups, or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-36568 allows a low-privileged local attacker to expose credentials stored by Dell PowerProtect Data Domain BoostFS. This can lead to unauthorized access to the Data Domain system, potentially granting the attacker the same privileges as the compromised account. Depending on the privileges of the compromised account, this could lead to a full system compromise, data exfiltration, backup disruption, and potential ransomware deployment. The impact is significant for organizations relying on PowerProtect Data Domain for data protection, as it can compromise the integrity and availability of their backups.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Dell PowerProtect Data Domain BoostFS to a patched version that addresses CVE-2025-36568. Refer to Dell&rsquo;s security advisory for specific upgrade instructions.</li>
<li>Monitor file access events for suspicious access to files within the Dell PowerProtect Data Domain BoostFS installation directory. Deploy the Sigma rule &ldquo;Detect Suspicious Access to Dell PowerProtect BoostFS Credential Files&rdquo; to your SIEM and tune for your environment.</li>
<li>Implement strong access controls to restrict local access to systems running Dell PowerProtect Data Domain BoostFS.</li>
<li>Regularly audit user accounts and privileges on the PowerProtect Data Domain system to identify and remove unnecessary accounts or excessive privileges.</li>
<li>Enable logging and alerting for successful and failed login attempts to the PowerProtect Data Domain system to detect potential unauthorized access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-exposure</category><category>dell</category><category>powerprotect</category><category>CVE-2025-36568</category></item></channel></rss>