CVE-2026-35154
Received Received - Intake
Improper Privilege Management in Dell PowerProtect IDRAC Enables Privilege Escalation

Publication date: 2026-04-20

Last updated on: 2026-04-28

Assigner: Dell

Description
Dell PowerProtect Data Domain appliances, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain an improper privilege management vulnerability in IDRAC. A high privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges to access unauthorized delete operation in IDRAC.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
dell data_domain_operating_system From 7.13.1.0 (inc) to 7.13.1.70 (exc)
dell data_domain_operating_system From 8.3.0.0 (inc) to 8.3.1.30 (exc)
dell data_domain_operating_system From 8.4.0.0 (inc) to 8.6.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The impact of this vulnerability is significant because it allows a high privileged attacker with local access to escalate their privileges further. This could lead to unauthorized deletion of data or configurations within the IDRAC system, potentially causing data loss, disruption of services, or compromise of system integrity.


Can you explain this vulnerability to me?

This vulnerability exists in Dell PowerProtect Data Domain appliances, specifically in versions 7.7.1.0 through 8.7.0.0 and certain LTS2025 and LTS2024 release versions. It is an improper privilege management issue within the IDRAC component. A highly privileged attacker who has local access to the system could exploit this flaw to elevate their privileges, allowing them to perform unauthorized delete operations within IDRAC.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart