EUVD-2026-23392

| CVE-2026-23775 HIGH
2026-04-17 dell GHSA-w42r-7hmw-4854
7.6
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High

Lifecycle Timeline

4
patch_available
Apr 17, 2026 - 10:01 EUVD
Analysis Updated
Apr 17, 2026 - 09:28 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 17, 2026 - 09:22 vuln.today
cvss_changed
Analysis Generated
Apr 17, 2026 - 09:15 vuln.today

DescriptionNVD

Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD OS) of Feature Release versions 8.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.10 contain an insertion of sensitive information into log file vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to credential exposures. Authentication attempts as the compromised user would need to be authorized by a high privileged DD user. This vulnerability only affects systems with retention lock enabled.

AnalysisAI

Dell PowerProtect Data Domain appliances log sensitive credentials when retention lock is enabled, allowing low-privileged remote attackers to harvest authentication data from log files. Affects DD OS 8.0-8.5 and LTS2025 8.3.1.0-8.3.1.10. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Dell PowerProtect Data Domain appliances in your environment and verify which are running affected versions (DD OS 8.0-8.5, LTS2025 8.3.1.0-8.3.1.10) using Dell DSA-2026-060. Within 7 days: Restrict log file access through RBAC to high-privilege accounts only and review recent log access by low-privilege users. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23392 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy