Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22269: CWE-940: Improper Verification of Source of a Communication Channel in Dell PowerProtect Data Manager

0
Medium
VulnerabilityCVE-2026-22269cvecve-2026-22269cwe-940
Published: Thu Feb 19 2026 (02/19/2026, 09:00:56 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerProtect Data Manager

Description

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Improper Verification of Source of a Communication Channel vulnerability in the REST API. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to protection mechanism bypass.

AI-Powered Analysis

AILast updated: 02/19/2026, 09:25:45 UTC

Technical Analysis

CVE-2026-22269 identifies a vulnerability classified under CWE-940, which pertains to improper verification of the source of a communication channel within the REST API of Dell PowerProtect Data Manager versions prior to 19.22. This flaw allows an attacker with high privileges and remote access to bypass protection mechanisms that normally safeguard the system. The vulnerability arises because the REST API does not adequately verify the origin of incoming communication, potentially permitting unauthorized commands or data manipulation despite existing security controls. Although exploitation requires the attacker to already have high-level privileges, the lack of source verification can enable privilege escalation or unauthorized actions that compromise the system's confidentiality, integrity, and availability. The CVSS 3.1 base score of 4.7 reflects a medium severity, considering the network attack vector, low attack complexity, and no requirement for user interaction. The vulnerability affects enterprise environments relying on Dell PowerProtect Data Manager for backup and data protection, which are critical for business continuity and regulatory compliance. No public exploits or active exploitation have been reported to date, but the risk remains significant due to the potential for bypassing security controls remotely.

Potential Impact

For European organizations, the vulnerability could lead to unauthorized bypass of protection mechanisms in backup and data management systems, potentially resulting in data exposure, unauthorized data modification, or disruption of backup operations. This could affect data integrity and availability, critical for compliance with GDPR and other data protection regulations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which rely heavily on data protection solutions like Dell PowerProtect Data Manager, may face increased risk of operational disruption or data breaches. The medium severity rating suggests that while the vulnerability is not trivially exploitable by low-privileged attackers, the consequences of exploitation could be significant, especially if combined with other vulnerabilities or insider threats. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Apply patches or updates from Dell as soon as they become available for PowerProtect Data Manager to address CVE-2026-22269. 2. Restrict remote access to the REST API to trusted networks and users only, using network segmentation and firewall rules. 3. Implement strong authentication and authorization controls to limit high-privilege access to the system. 4. Monitor API usage logs for unusual or unauthorized access patterns that could indicate exploitation attempts. 5. Conduct regular security assessments and penetration testing focusing on API security and privilege escalation vectors. 6. Employ network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous REST API traffic. 7. Educate administrators and security teams about the risks associated with improper source verification and the importance of strict access controls. 8. Maintain an incident response plan that includes scenarios involving backup system compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-07T06:43:46.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996d42f6aea4a407a4d2c51

Added to database: 2/19/2026, 9:13:19 AM

Last enriched: 2/19/2026, 9:25:45 AM

Last updated: 2/21/2026, 2:19:21 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats