Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22273: CWE-1392: Use of Default Credentials in Dell ObjectScale

0
High
VulnerabilityCVE-2026-22273cvecve-2026-22273cwe-1392
Published: Fri Jan 23 2026 (01/23/2026, 09:14:38 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: ObjectScale

Description

CVE-2026-22273 is a high-severity vulnerability in Dell ObjectScale and Dell ECS versions prior to 4. 2. 0. 0 and 3. 8. 1. 8 respectively, caused by the use of default credentials. A low-privileged attacker with remote access can exploit this flaw to elevate privileges without user interaction. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 8. 8.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:54:29 UTC

Technical Analysis

CVE-2026-22273 is a vulnerability identified in Dell ObjectScale (versions prior to 4.2.0.0) and Dell ECS (versions 3.8.1.0 through 3.8.1.7). The root cause is the use of default credentials embedded within the operating system or management interfaces, classified under CWE-1392 (Use of Default Credentials). This security flaw allows an attacker with remote network access and low privileges to authenticate using these default credentials, bypassing normal security controls. Exploitation leads to elevation of privileges, granting the attacker higher-level access to the system, potentially full administrative rights. The vulnerability does not require user interaction and can be exploited remotely, increasing its risk profile. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and only low privileges required. Although no known exploits have been reported in the wild yet, the presence of default credentials is a well-known and easily exploitable weakness. Dell has not yet published patches but organizations should anticipate updates and act to mitigate risk in the interim. The vulnerability affects critical storage infrastructure components used for object storage and cloud-native applications, making it a significant threat vector in enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a serious risk to data confidentiality, integrity, and availability. Dell ObjectScale and ECS are used in enterprise storage and cloud infrastructure, often holding sensitive or critical business data. Exploitation could allow attackers to gain administrative control, leading to data breaches, ransomware deployment, or disruption of storage services. This is particularly concerning for sectors such as finance, healthcare, government, and telecommunications, where data protection is paramount. The remote exploitability and lack of user interaction mean attackers can operate stealthily and at scale. Additionally, the elevation of privileges could facilitate lateral movement within networks, increasing the scope of compromise. Organizations relying on Dell storage solutions without timely mitigation may face regulatory penalties under GDPR if personal data is exposed. The threat also undermines trust in cloud-native storage deployments, potentially impacting digital transformation initiatives.

Mitigation Recommendations

Immediate mitigation steps include identifying all instances of Dell ObjectScale and ECS within the network and verifying if they run vulnerable versions. Administrators should change all default credentials to strong, unique passwords to eliminate the primary attack vector. Network segmentation and access controls should be enforced to restrict remote access to management interfaces. Monitoring and logging should be enhanced to detect unusual authentication attempts or privilege escalations. Organizations should prepare to apply official patches or upgrades from Dell as soon as they are released, prioritizing critical systems. Additionally, consider implementing multi-factor authentication (MFA) on management interfaces if supported. Conducting a thorough security audit of storage infrastructure and integrating vulnerability scanning into regular maintenance cycles will help prevent future occurrences. Finally, ensure incident response plans include scenarios involving storage system compromise to enable rapid containment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-07T06:43:46.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69733d904623b1157c262fc8

Added to database: 1/23/2026, 9:21:20 AM

Last enriched: 1/30/2026, 9:54:29 AM

Last updated: 2/7/2026, 11:24:54 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats