CVE-2026-35155
Race Condition in Dell iDRAC10 Allows Privilege Escalation
Publication date: 2026-04-29
Last updated on: 2026-05-01
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | idrac10_firmware | to 1.30.10.50 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Dell iDRAC10 versions 1.20.70.50 and 1.30.05.10 and is classified as an Insufficiently Protected Credentials issue. It involves a race condition that could allow an authenticated attacker with low privileges to gain elevated access.
How can this vulnerability impact me? :
An attacker who is authenticated with low privileges could exploit this race condition vulnerability to escalate their access rights. This could lead to unauthorized control over the affected system, potentially compromising confidentiality, integrity, and availability.
Can you explain this vulnerability to me?
This vulnerability exists in Dell iDRAC10 versions 1.20.70.50 and 1.30.05.10 and is classified as an Insufficiently Protected Credentials issue. It involves a race condition that could allow an authenticated attacker with low privileges to gain elevated access.
How can this vulnerability impact me? :
An attacker who is authenticated but has low privileges could exploit this vulnerability to escalate their access rights. This could lead to unauthorized control over the affected system, potentially compromising confidentiality, integrity, and availability.