<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Weak Credentials — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/weak-credentials/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 08:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/weak-credentials/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dell PowerProtect Data Domain Weak Credentials Vulnerability (CVE-2026-23853)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-weak-creds/</link><pubDate>Fri, 17 Apr 2026 08:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-weak-creds/</guid><description>Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50, contain a use of weak credentials vulnerability (CVE-2026-23853) that can lead to unauthorized access by a local attacker.</description><content:encoded><![CDATA[<p>Dell PowerProtect Data Domain is affected by a vulnerability (CVE-2026-23853) stemming from the use of weak credentials in Data Domain Operating System (DD OS). This issue impacts Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, and LTS2024 release versions 7.13.1.0 through 7.13.1.50. An unauthenticated, local attacker could exploit this vulnerability to gain unauthorized access to the system. Exploitation does not require network access, but rather relies on the presence of weak default or easily guessable credentials within the affected DD OS versions. This vulnerability poses a significant risk to the confidentiality, integrity, and availability of data stored on the affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains local access to a Dell PowerProtect Data Domain system running a vulnerable DD OS version (7.7.1.0-8.5, 8.3.1.0-8.3.1.20, or 7.13.1.0-7.13.1.50).</li>
<li>The attacker attempts to authenticate using default or weak credentials.</li>
<li>Upon successful authentication with weak credentials, the attacker gains unauthorized access to the DD OS.</li>
<li>The attacker escalates privileges within the DD OS using commands available through the compromised account.</li>
<li>The attacker gains access to sensitive data, including backup configurations, data encryption keys, or stored data backups.</li>
<li>The attacker exfiltrates sensitive data from the Data Domain system to a remote location.</li>
<li>The attacker modifies backup configurations to disrupt or prevent future backups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23853 allows an attacker with local access to gain unauthorized access to Dell PowerProtect Data Domain systems. This can lead to the compromise of sensitive data stored within the backups, including customer data, financial records, and intellectual property. The impact ranges from data breaches and financial losses to reputational damage and disruption of business operations. The affected systems are primarily used in enterprise environments, so a successful attack may impact hundreds of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Dell as described in DSA-2026-060 to remediate the weak credentials vulnerability detailed in CVE-2026-23853. The advisory URL is available in the references section.</li>
<li>Review and enforce strong password policies for all accounts on Dell PowerProtect Data Domain systems.</li>
<li>Monitor authentication logs for the use of default credentials and failed login attempts on the affected systems.</li>
<li>Restrict local access to Dell PowerProtect Data Domain systems to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-23853</category><category>dell</category><category>powerprotect</category><category>data domain</category><category>weak credentials</category></item></channel></rss>