CVE-2026-26945
Process Control Vulnerability in Dell iDRAC Allows Code Execution
Publication date: 2026-03-18
Last updated on: 2026-03-18
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | integrated_dell_remote_access_controller_9 | to 7.00.00.181 (exc) |
| dell | integrated_dell_remote_access_controller_14g | to 7.00.00.181 (exc) |
| dell | integrated_dell_remote_access_controller_15g | to 7.20.10.50 (exc) |
| dell | integrated_dell_remote_access_controller_16g | to 7.20.10.50 (exc) |
| dell | integrated_dell_remote_access_controller_10 | to 1.20.25.00 (exc) |
| dell | integrated_dell_remote_access_controller_17g | to 1.20.25.00 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-114 | Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application to execute malicious commands (and payloads) on behalf of an attacker. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Dell Integrated Dell Remote Access Controller (iDRAC) versions 9, 14G, 15G, 16G, 10, and 17G prior to certain fixed versions. It is a Process Control vulnerability that can be exploited by a highly privileged attacker who has adjacent network access. Exploiting this vulnerability could allow the attacker to execute arbitrary code on the affected system.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a high privileged attacker with adjacent network access to execute arbitrary code on the affected Dell iDRAC system. This could lead to unauthorized control over the system, potentially compromising its integrity, availability, and confidentiality.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know