CVE-2026-35155
Received Received - Intake
Race Condition in Dell iDRAC10 Allows Privilege Escalation

Publication date: 2026-04-29

Last updated on: 2026-05-01

Assigner: Dell

Description
Dell iDRAC10, versions 1.20.70.50 and 1.30.05.10, contains an Insufficiently Protected Credentials vulnerability. A race condition vulnerability exists that could allow an authenticated low‑privileged attacker to gain elevated access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-29
Last Modified
2026-05-01
Generated
2026-05-06
AI Q&A
2026-04-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dell idrac10_firmware to 1.30.10.50 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Dell iDRAC10 versions 1.20.70.50 and 1.30.05.10 and is classified as an Insufficiently Protected Credentials issue. It involves a race condition that could allow an authenticated attacker with low privileges to gain elevated access.


How can this vulnerability impact me? :

An attacker who is authenticated with low privileges could exploit this race condition vulnerability to escalate their access rights. This could lead to unauthorized control over the affected system, potentially compromising confidentiality, integrity, and availability.


Can you explain this vulnerability to me?

This vulnerability exists in Dell iDRAC10 versions 1.20.70.50 and 1.30.05.10 and is classified as an Insufficiently Protected Credentials issue. It involves a race condition that could allow an authenticated attacker with low privileges to gain elevated access.


How can this vulnerability impact me? :

An attacker who is authenticated but has low privileges could exploit this vulnerability to escalate their access rights. This could lead to unauthorized control over the affected system, potentially compromising confidentiality, integrity, and availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart