Dell EUVD-2026-23885

| CVE-2026-24505 HIGH
Improper Input Validation (CWE-20)
2026-04-20 dell GHSA-5f9j-32h2-hhg6
7.2
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Re-analysis Queued
Apr 20, 2026 - 17:52 vuln.today
cvss_changed
Analysis Generated
Apr 20, 2026 - 17:52 vuln.today
Patch available
Apr 20, 2026 - 17:16 EUVD

DescriptionNVD

Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain an improper input validation vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

AnalysisAI

Arbitrary command execution with root privileges in Dell PowerProtect Data Domain versions 8.5 through 8.6 allows high-privileged remote attackers to escalate from administrative access to full system control via improper input validation. Dell has released patches (versions 2.7.9 with DD OS 8.3.1.30, and 8.6.1.10+) per DSA-2026-060. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Dell PowerProtect Data Domain deployments running versions 8.5-8.6 and document administrative account activity. Within 7 days: Apply vendor patches (DD OS 8.3.1.30 or 8.6.1.10 and later) to all affected systems, prioritizing production environments. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23885 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy