EUVD-2026-17822

| CVE-2026-27101 MEDIUM
2026-04-01 dell
4.7
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
EUVD ID Assigned
Apr 01, 2026 - 08:00 euvd
EUVD-2026-17822
Analysis Generated
Apr 01, 2026 - 08:00 vuln.today
CVE Published
Apr 01, 2026 - 07:27 nvd
MEDIUM 4.7

Description

Dell Secure Connect Gateway (SCG) 5.0 Appliance and Application version(s) 5.28.00.xx to 5.32.00.xx, contain(s) an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. A high privileged attacker within the management network could potentially exploit this vulnerability, leading to remote execution.

Analysis

Path traversal vulnerability in Dell Secure Connect Gateway (SCG) versions 5.28.00.xx through 5.32.00.xx allows high-privileged attackers on the management network to bypass directory restrictions and achieve remote code execution. With a CVSS score of 4.7 and requiring high privilege level access, this vulnerability poses moderate risk to organizations running vulnerable SCG versions but is limited by the need for administrative-level attacker access within the management network. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

24
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +24
POC: 0

Share

EUVD-2026-17822 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy