Description
Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, versions prior to 4.1.0.3 and version 4.2.0.0, contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to secret exposure. The attacker may be able to use the exposed secret to access the vulnerable system with privileges of the compromised account.
Published: 2026-04-08
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows a low‑privileged local user to cause system components to write sensitive data, such as authentication tokens or credentials, directly to log files. The insertion of this data into logs violates confidentiality and may let the attacker read those logs and extract secrets. By leveraging the exposed secrets, an attacker could potentially access the system with the privileges of the compromised local account. The weakness is classified as CWE‑532, an insertion of sensitive information into log files.

Affected Systems

Affected are Dell Elastic Cloud Storage releases 3.8.1.7 and earlier and Dell ObjectScale versions before 4.1.0.3, as well as version 4.2.0.0. Any deployment of these products that has not applied the security update listed in the Dell Knowledge Base article is at risk. The vulnerability is present whenever the product is installed on a system that writes sensitive data to its logs.

Risk and Exploitability

The CVSS base score of 7.8 indicates a high severity level based solely on potential for secret disclosure. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector requires local, non‑privileged access and the ability to read log files, which is typically available to any local user on the host. If an attacker can read the logs they can obtain secrets; the description does not indicate any remote exploitation paths or denial‑of‑service impact. The risk is therefore confined to confidentiality compromise and potential local privilege or other exploitation that may follow.

Generated by OpenCVE AI on April 13, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Dell security update referenced in the Dell Knowledge Base article to upgrade to a non‑affected release of Elastic Cloud Storage or ObjectScale.
  • Configure the product or the underlying operating system so that log files do not contain sensitive data and are protected from read access by non‑privileged local users, using file permissions.
  • If a patch cannot be applied promptly, restrict access to the log directories and monitor for any unauthorized read activity.
  • Check the Dell website for newer advisories or supplemental mitigations if the current fix does not fully cover the environment.

Generated by OpenCVE AI on April 13, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Insertion of Sensitive Information into Log File in Dell Elastic Cloud Storage and ObjectScale

Mon, 13 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:dell:elastic_cloud_storage:*:*:*:*:*:*:*:*
cpe:2.3:a:dell:objectscale:*:*:*:*:*:*:*:*
cpe:2.3:a:dell:objectscale:4.2.0.0:*:*:*:*:*:*:*

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Insertion of Sensitive Information into Log File in Dell Elastic Cloud Storage and ObjectScale

Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell elastic Cloud Storage
Dell objectscale
Vendors & Products Dell
Dell elastic Cloud Storage
Dell objectscale

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
Description Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, versions prior to 4.1.0.3 and version 4.2.0.0, contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to secret exposure. The attacker may be able to use the exposed secret to access the vulnerable system with privileges of the compromised account.
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Dell Elastic Cloud Storage Objectscale
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2026-04-09T03:55:55.676Z

Reserved: 2026-02-25T18:04:25.462Z

Link: CVE-2026-28261

cve-icon Vulnrichment

Updated: 2026-04-08T13:55:38.761Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T13:16:41.533

Modified: 2026-04-13T18:20:21.650

Link: CVE-2026-28261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:38:16Z

Weaknesses