Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22273: CWE-1392: Use of Default Credentials in Dell ObjectScale

0
High
VulnerabilityCVE-2026-22273cvecve-2026-22273cwe-1392
Published: Fri Jan 23 2026 (01/23/2026, 09:14:38 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: ObjectScale

Description

Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains an Use of Default Credentials vulnerability in the OS. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:41:36 UTC

Technical Analysis

CVE-2026-22273 is a vulnerability categorized under CWE-1392, which involves the use of default credentials in Dell's ObjectScale and ECS storage platforms. Specifically, Dell ECS versions 3.8.1.0 through 3.8.1.7 and ObjectScale versions prior to 4.2.0.0 ship with default credentials that have not been changed or properly secured. This security flaw allows a remote attacker with low privileges to authenticate using these default credentials and subsequently escalate their privileges within the system. The vulnerability is remotely exploitable without user interaction and requires low attack complexity, making it a significant risk. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as an attacker could gain administrative control over the storage environment. While no public exploits have been reported yet, the presence of default credentials is a well-known attack vector frequently targeted by threat actors. The vulnerability affects critical storage infrastructure used by enterprises for object storage and cloud-native applications, potentially exposing sensitive data and disrupting services. The lack of available patches at the time of reporting necessitates immediate compensating controls to mitigate risk.

Potential Impact

The exploitation of this vulnerability could have severe consequences for organizations worldwide. Attackers leveraging default credentials can gain unauthorized administrative access to Dell ObjectScale and ECS environments, leading to full compromise of stored data and system configurations. This includes the potential theft, modification, or deletion of sensitive information, disruption of storage services, and the ability to pivot to other internal systems. Given the role of these platforms in enterprise and cloud storage, a successful attack could impact data integrity and availability for critical business operations. The ease of exploitation and remote access capability increase the likelihood of attacks, especially in environments where default credentials remain unchanged or remote access is insufficiently restricted. This could lead to significant operational downtime, regulatory compliance violations, and reputational damage for affected organizations.

Mitigation Recommendations

Organizations should immediately audit their Dell ObjectScale and ECS deployments to identify any use of default credentials and change them to strong, unique passwords. Network segmentation and access controls should be implemented to restrict remote access to management interfaces to trusted IP addresses only. Employ multi-factor authentication (MFA) where supported to add an additional layer of security. Monitor logs and network traffic for unusual authentication attempts or privilege escalation activities. Stay in close contact with Dell for official patches or updates addressing this vulnerability and apply them promptly once available. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. Regularly review and update security policies related to credential management and remote access to minimize exposure. Finally, conduct security awareness training to ensure administrators understand the risks of default credentials and the importance of secure configuration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-07T06:43:46.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69733d904623b1157c262fc8

Added to database: 1/23/2026, 9:21:20 AM

Last enriched: 2/27/2026, 8:41:36 AM

Last updated: 3/24/2026, 12:50:11 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses