Description
Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain a command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.
Published: 2026-04-20
Score: 6.7 Medium
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Dell PowerProtect Data Domain versions 8.5 through 8.6 contain a command injection flaw that allows a high‑privileged attacker with remote access to run arbitrary commands as root. The vulnerability stems from unsanitized input being included in a shell command, which can be exploited to execute any code the attacker wishes, compromising confidentiality, integrity, and availability of the affected system.

Affected Systems

Dell PowerProtect Data Domain, affected directly by versions 8.5, 8.5.1, 8.6, and any minor revisions released with the same code base.

Risk and Exploitability

The CVSS score of 6.7 indicates a moderate‑to‑high severity. EPSS information is not available, and the vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector involves a remote attacker who already has privileged network access to the PowerProtect appliance; from that position an attacker can submit crafted requests that trigger the command injection and obtain root privileges.

Generated by OpenCVE AI on April 20, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Dell DSA‑2026‑060 security update for PowerProtect Data Domain to patch the command injection flaw.
  • Limit remote network access to the PowerProtect appliance by enforcing firewalls, VPNs, and least‑privilege account policies.
  • Enable logging and continuous monitoring of system commands and privilege‑elevating activities to detect anomalous behavior.

Generated by OpenCVE AI on April 20, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title Command Injection in Dell PowerProtect Data Domain Enabling Remote Root Execution

Mon, 20 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell powerprotect Data Domain
Vendors & Products Dell
Dell powerprotect Data Domain

Mon, 20 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain a command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Dell Powerprotect Data Domain
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2026-04-20T18:00:41.131Z

Reserved: 2026-01-09T18:05:08.763Z

Link: CVE-2026-22761

cve-icon Vulnrichment

Updated: 2026-04-20T18:00:30.415Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T17:16:31.053

Modified: 2026-04-20T19:05:30.750

Link: CVE-2026-22761

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T18:45:14Z

Weaknesses