Description
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains an Use of Default Credentials vulnerability in the OS. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.
Published: 2026-01-23
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The vulnerability originates from use of default credentials within the operating system of Dell ECS and ObjectScale. Because default credentials are left unchanged, an attacker who already has low‑privileged remote access can trigger an elevation of privileges, potentially gaining higher administrative rights without needing to bypass authentication. This can compromise confidentiality, integrity, and availability of the data stored within the impacted ObjectScale services.

Affected Systems

Affected products are Dell Elastic Cloud Storage version 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.2.0.0. These versions run on Dell's integrated storage platform, exposing the default credential risk across all nodes within those deployments.

Risk and Exploitability

The CVSS score of 8.8 indicates a high impact severity, while the EPSS score of less than 1% suggests a low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is likely remote, although the exact network requirements are not stated, so the inference is that the attacker must be able to reach the target via the network and possess at least low‑privileged credentials. Once the attacker authenticates using default credentials, privilege escalation may ensue. Documentation does not indicate additional prerequisites, so successful exploitation should result from the presence of unchanged default passwords.

Generated by OpenCVE AI on April 18, 2026 at 03:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Dell ECS and ObjectScale security update (Dell Security Advisory 2026‑047) to all affected versions (ECS 3.8.1.0–3.8.1.7, ObjectScale <4.2.0.0).
  • Immediately disable or change all default credentials on every node, ensuring unique, strong passwords and proper access controls are enforced.
  • Configure centralized monitoring to detect attempts to use default credentials and review logs for anomalous remote authentication activity.

Generated by OpenCVE AI on April 18, 2026 at 03:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Dell elastic Cloud Storage
CPEs cpe:2.3:a:dell:elastic_cloud_storage:*:*:*:*:*:*:*:*
cpe:2.3:a:dell:objectscale:*:*:*:*:*:*:*:*
Vendors & Products Dell elastic Cloud Storage

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell objectscale
Vendors & Products Dell
Dell objectscale

Fri, 23 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains an Use of Default Credentials vulnerability in the OS. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.
Weaknesses CWE-1392
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Dell Elastic Cloud Storage Objectscale
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2026-02-26T14:44:23.966Z

Reserved: 2026-01-07T06:43:46.537Z

Link: CVE-2026-22273

cve-icon Vulnrichment

Updated: 2026-01-23T15:16:40.212Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T10:15:53.317

Modified: 2026-02-18T13:55:12.593

Link: CVE-2026-22273

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:15:35Z

Weaknesses