Impact
Dell Unisphere for PowerMax version 10.2 has a missing authorization flaw that permits a low‑privileged attacker with remote access to gain unauthorized access to the system. The vulnerability effectively bypasses user‑level checks, allowing the attacker to view or manipulate data and administrative functions that should be restricted. This impact compromises both confidentiality and integrity of the data stored and managed by Unisphere for PowerMax.
Affected Systems
The affected product is Dell Unisphere for PowerMax, versions 10.2, including configurations that use the Emulation Environment Manager (EEM). Products are identified by Dell:PowerMax and Dell:Unisphere for PowerMax. No other specific versions are listed as affected, but all deployments using Unisphere 10.2 should be considered vulnerable.
Risk and Exploitability
The CVSS base score of 8.8 classifies the vulnerability as high severity, while the EPSS score of less than 1% indicates a low probability of exploitation at present. The vulnerability is not present in the CISA Known Exploited Vulnerabilities catalog. The most likely attack vector is remote access from within a trusted network or a breached internal environment, because the attacker requires network connectivity to the Unisphere instance. Operated within normal business protocols, an attacker could achieve unauthorized data access or configuration changes without being detected by standard authentication controls.
OpenCVE Enrichment