Description
Dell PowerProtect Data Domain appliances, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain an improper privilege management vulnerability in IDRAC. A high privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges to access unauthorized delete operation in IDRAC.
Published: 2026-04-20
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

An improper privilege management flaw exists in the Integrated Dell Remote Access Controller (IDRAC) of Dell PowerProtect Data Domain appliances. The flaw allows a local attacker who already possesses high privileges to elevate their privileges and execute delete operations that should be restricted. The vulnerability is categorized as a CWE‑269 (Access Control). The impact is the potential for a local attacker to gain elevated privileges and perform unauthorized deletions, compromising data integrity and availability.

Affected Systems

The vulnerability affects Dell PowerProtect Data Domain appliances running firmware versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 through 8.3.1.20, and LTS2024 release versions 7.13.1.0 through 7.13.1.60.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity, while the absence of an EPSS score leaves the exact exploitation probability unknown. The vulnerability is not currently listed in the CISA KEV catalog, suggesting no widespread exploitation yet. A local attacker who has high‑privileged access on the appliance could exploit the flaw through the IDRAC interface, elevating privileges to perform unauthorized delete operations. Because the attack requires local high‑privilege access, it is less likely to be leveraged remotely, but within a compromised environment the risk remains significant.

Generated by OpenCVE AI on April 20, 2026 at 18:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the Dell PowerProtect Data Domain firmware update released in Dell Security Advisory 2026‑060, which addresses the IDRAC privilege escalation flaw.
  • Upgrade the IDRAC firmware component to the latest version published by Dell.
  • Reboot the appliance to ensure the firmware changes take effect.
  • Restrict local IDRAC access and enforce least‑privilege policies for local user accounts to reduce the attack surface.

Generated by OpenCVE AI on April 20, 2026 at 18:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title IDRAC Privilege Escalation via Improper Access Control

Mon, 20 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description Dell PowerProtect Data Domain appliances, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain an improper privilege management vulnerability in IDRAC. A high privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges to access unauthorized delete operation in IDRAC.
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2026-04-20T18:08:44.096Z

Reserved: 2026-04-01T17:04:27.475Z

Link: CVE-2026-35154

cve-icon Vulnrichment

Updated: 2026-04-20T18:08:38.657Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T17:16:34.263

Modified: 2026-04-20T19:05:30.750

Link: CVE-2026-35154

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T18:45:14Z

Weaknesses