Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection Allowing Root Privilege Escalation in Dell PowerProtect Data Domain | |
| First Time appeared |
Dell
Dell powerprotect Data Domain |
|
| Vendors & Products |
Dell
Dell powerprotect Data Domain |
Mon, 20 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2026-04-22T03:56:05.261Z
Reserved: 2026-02-16T18:04:20.508Z
Link: CVE-2026-26942
Updated: 2026-04-21T13:29:58.965Z
Status : Awaiting Analysis
Published: 2026-04-20T17:16:32.657
Modified: 2026-04-20T19:05:30.750
Link: CVE-2026-26942
No data.
OpenCVE Enrichment
Updated: 2026-04-20T17:30:12Z