Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22268: CWE-266: Incorrect Privilege Assignment in Dell PowerProtect Data Manager

0
Medium
VulnerabilityCVE-2026-22268cvecve-2026-22268cwe-266
Published: Thu Feb 19 2026 (02/19/2026, 09:12:08 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to denial of service of a Dell Enterprise Support connection.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:00:58 UTC

Technical Analysis

CVE-2026-22268 is a vulnerability classified under CWE-266 (Incorrect Privilege Assignment) affecting Dell PowerProtect Data Manager versions prior to 19.22. This vulnerability arises because the software incorrectly assigns privileges, allowing a low privileged attacker with remote access to escalate privileges or perform actions beyond their intended scope. Exploitation requires user interaction, such as triggering a specific function or process remotely. The primary impact is a denial of service condition that disrupts the Dell Enterprise Support connection, which is critical for enterprise environments relying on Dell's support infrastructure for backup and data protection management. The vulnerability does not compromise confidentiality but affects integrity and availability by interrupting support services. The CVSS 3.1 base score of 6.3 reflects a medium severity level, with attack vector being network-based, low attack complexity, requiring low privileges, and user interaction. No public exploits or active exploitation have been reported yet. The vulnerability highlights the importance of proper privilege assignment in enterprise backup management software, as improper privilege controls can lead to service disruptions that impact business continuity. Dell PowerProtect Data Manager is widely used in enterprise environments for backup, recovery, and data protection, making this vulnerability relevant for organizations with critical data infrastructure.

Potential Impact

For European organizations, the impact of CVE-2026-22268 could be significant in sectors heavily reliant on Dell PowerProtect Data Manager for data backup and recovery, such as finance, healthcare, telecommunications, and government. A denial of service on the Dell Enterprise Support connection could delay critical support and remediation efforts, potentially prolonging downtime and affecting business continuity. While the vulnerability does not expose sensitive data directly, the disruption of support services can indirectly impact operational integrity and availability of backup systems. Organizations with remote management enabled and low privilege user access to the system are at higher risk. The medium severity rating suggests that while the threat is not immediately critical, it requires timely attention to avoid escalation or exploitation in complex attack scenarios. European enterprises with stringent data protection regulations (e.g., GDPR) must consider the operational risks posed by such service disruptions, as they could affect compliance and incident response capabilities.

Mitigation Recommendations

1. Monitor Dell’s official channels for the release of patches addressing CVE-2026-22268 and apply them promptly once available. 2. Restrict remote access to Dell PowerProtect Data Manager interfaces to trusted networks and users only, employing network segmentation and VPNs where possible. 3. Enforce strict role-based access control (RBAC) policies to limit privileges granted to users, ensuring the principle of least privilege is maintained. 4. Implement multi-factor authentication (MFA) for all remote access to management consoles to reduce the risk of unauthorized exploitation. 5. Regularly audit user privileges and access logs to detect any anomalous activities that could indicate attempted exploitation. 6. Educate users about the need for caution with remote interactions that could trigger the vulnerability, minimizing user interaction risks. 7. Prepare incident response plans specifically addressing potential denial of service scenarios affecting backup and support services to reduce downtime impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-07T06:43:46.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb458fb9188dea8c010c

Added to database: 2/19/2026, 12:00:05 PM

Last enriched: 2/19/2026, 12:00:58 PM

Last updated: 2/20/2026, 11:42:56 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats