Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

674+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2025-36568: Dell PowerProtect Data Domain BoostFS Credential Exposure
CVE-2025-36568: Dell PowerProtect Data Domain BoostFS Credential Exposure
SECURITYHIGHCVE-2025-36568

CVE-2025-36568: Dell PowerProtect Data Domain BoostFS Credential Exposure

A high-severity insufficiently protected credentials vulnerability in Dell PowerProtect Data Domain BoostFS allows low-privileged local attackers to extract plaintext credentials and escalate privileges across affected enterprise backup infrastructure.

Dylan H.

Security Team

April 18, 2026
3 min read

Affected Products

  • Dell PowerProtect Data Domain BoostFS FR 7.7.1.0 – 8.5
  • Dell PowerProtect Data Domain LTS2025 8.3.1.0 – 8.3.1.20
  • Dell PowerProtect Data Domain LTS2024 7.13.1.0 – 7.13.1.50

Overview

CVE-2025-36568 is a CWE-522 (Insufficiently Protected Credentials) vulnerability affecting Dell PowerProtect Data Domain BoostFS, a client component used in enterprise data protection and disaster recovery deployments. The flaw enables a low-privileged local attacker to extract stored credentials from the affected system, potentially enabling privilege escalation and lateral movement within backup infrastructure.

Dell has assigned this vulnerability a CVSS 3.1 base score of 7.8 (HIGH).

Technical Details

The vulnerability stems from inadequate protection of stored credentials within the BoostFS client component. Dell PowerProtect Data Domain is widely deployed in enterprise environments for deduplication, backup, and disaster recovery — making this class of credential exposure particularly dangerous.

An attacker with local access at a low privilege level can exploit this flaw to retrieve credentials in plaintext or weakly protected form. The extracted credentials can then be leveraged to authenticate to higher-privileged system components or adjacent infrastructure, creating a path for privilege escalation and lateral movement across backup environments.

Weakness classification: CWE-522 — Insufficiently Protected Credentials

Affected Versions

Release LineAffected Versions
Feature Release7.7.1.0 through 8.5
LTS20258.3.1.0 through 8.3.1.20
LTS20247.13.1.0 through 7.13.1.50

Impact

Successful exploitation allows a local attacker to:

  • Extract plaintext or weakly protected credentials from the BoostFS client
  • Authenticate to Data Domain systems with escalated privileges
  • Access protected backup data repositories
  • Potentially pivot to other infrastructure using harvested credentials

Given that Dell PowerProtect Data Domain is commonly deployed in environments storing sensitive enterprise backups, credential theft from this component represents a high-value target for ransomware operators and insider threat actors.

Remediation

Dell has released patches addressing this vulnerability across all affected release lines. Organizations should review the following Dell Security Advisories and upgrade to fixed versions immediately:

  • DSA-2025-159
  • DSA-2025-333
  • DSA-2025-415
  • DSA-2026-060

Upgrade to the latest available version within your release track. After patching, rotate any credentials that may have been stored or processed by BoostFS on affected systems.

Recommendations

  1. Patch immediately — apply updates to all affected Data Domain BoostFS deployments
  2. Audit credential storage — review how credentials are stored and transmitted within your Data Domain environment
  3. Rotate credentials — assume all credentials accessible to BoostFS on affected versions may be compromised
  4. Monitor for anomalous access — watch for unexpected authentication attempts against backup infrastructure
  5. Review local access controls — limit who can obtain local access to systems running affected BoostFS versions

References

  • NVD — CVE-2025-36568
  • Dell Security Advisory DSA-2025-159
#CVE-2025-36568#Dell#PowerProtect#Data Domain#Credential Exposure#CWE-522#Privilege Escalation

Related Articles

CVE-2026-5412: Juju Controller Facade Allows Low-Privilege Cloud Credential Theft

An authorization flaw in Juju's Controller facade allows any authenticated low-privilege user to call the CloudSpec API and extract the cloud provider...

7 min read

CVE-2026-34178: Canonical LXD Backup Import Path Restriction Bypass

A critical CVSS 9.1 vulnerability in Canonical LXD before 6.8 allows authenticated attackers to bypass project restrictions during backup import. The...

4 min read

CVE-2026-39860: Nix Symlink Attack Allows Root File Overwrite

A bypass of the CVE-2024-27297 patch in the Nix package manager allows attackers to follow symlinks during fixed-output derivation builds, enabling...

5 min read
Back to all Security Alerts