Impact
Dell Unisphere for PowerMax version 10.2 contains an External Control of File Name or Path weakness that allows a low‑privileged attacker to delete arbitrary files on the system. This flaw means that an attacker who can reach the Unisphere management interface could specify any file path, resulting in destructive file removal and potential disruption of storage services. The vulnerability is classified as CWE‑73 and is listed with a CVSS score of 8.1, indicating a high potential for damage if exploited.
Affected Systems
The affected products are Dell PowerMax and Dell Unisphere for PowerMax, specifically version 10.2 of Unisphere. The CPE strings identify the general Unisphere application and its EEM component, but no further sub‑version details are provided beyond the 10.2 release channel.
Risk and Exploitability
The severity (CVSS 8.1) reflects the potential for significant disruption, yet the EPSS score falls below 1%, suggesting that, at present, exploitation opportunities are very limited. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, which further reduces evidence of active attacks. The likely attack vector is remote, requiring native access to the Unisphere web interface, and is only feasible for a low‑privileged user who can establish a connection to the management service. If exploited, the attacker could delete critical configuration or data files, jeopardizing system availability and integrity.
OpenCVE Enrichment