Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22274: CWE-319: Cleartext Transmission of Sensitive Information in Dell ObjectScale

0
Medium
VulnerabilityCVE-2026-22274cvecve-2026-22274cwe-319
Published: Fri Jan 23 2026 (01/23/2026, 09:25:04 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: ObjectScale

Description

Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability in the Fabric Syslog. An unauthenticated attacker with remote access could potentially exploit this vulnerability to intercept and modify information in transit.

AI-Powered Analysis

AILast updated: 01/23/2026, 15:51:39 UTC

Technical Analysis

CVE-2026-22274 is a vulnerability classified under CWE-319, indicating the cleartext transmission of sensitive information. It affects Dell ObjectScale versions prior to 4.2.0.0 and Dell ECS versions 3.8.1.0 through 3.8.1.7. The flaw resides in the Fabric Syslog component, which transmits log data without encryption, exposing sensitive information to interception by unauthenticated remote attackers. Because the transmission is unencrypted, attackers positioned on the network path can perform man-in-the-middle attacks to capture or alter syslog data, potentially gaining insights into system operations or manipulating logs to cover malicious activities. The vulnerability requires no authentication or user interaction, increasing its exploitability. The CVSS 3.1 base score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported, the risk remains due to the sensitivity of the data transmitted and the potential for attackers to leverage intercepted information for further compromise. The vulnerability affects enterprise storage environments relying on Dell ObjectScale and ECS, which are used for scalable object storage solutions in cloud and data center infrastructures.

Potential Impact

For European organizations, the vulnerability poses a risk to confidentiality and integrity of log data transmitted within storage infrastructure environments. Intercepted syslog data could reveal sensitive operational details or credentials, facilitating lateral movement or targeted attacks. Modification of log data could undermine incident detection and forensic investigations, impairing security monitoring capabilities. Sectors such as finance, healthcare, and government, which rely heavily on secure storage and logging, are particularly vulnerable. The exposure could lead to regulatory non-compliance under GDPR if personal or sensitive data is compromised. Additionally, the lack of encryption in syslog transmission could be exploited in internal or external network environments, especially in organizations with less segmented or monitored networks. The medium severity rating suggests a moderate but actionable risk that should be addressed promptly to avoid escalation.

Mitigation Recommendations

Organizations should prioritize upgrading Dell ObjectScale to version 4.2.0.0 or later and Dell ECS to versions beyond 3.8.1.7 where the vulnerability is resolved. Until patches are applied, network administrators should enforce encryption for syslog traffic by configuring secure transport protocols such as TLS or VPN tunnels to protect log data in transit. Network segmentation should be implemented to isolate management and logging traffic from general network access, reducing exposure to unauthorized interception. Monitoring for anomalous network activity around syslog ports can help detect exploitation attempts. Additionally, organizations should review and harden access controls to limit remote access to syslog endpoints. Regular audits of logging infrastructure and incident response plans should incorporate scenarios involving log tampering or interception. Vendor advisories and updates should be closely followed to apply any further security enhancements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-07T06:43:46.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697395744623b1157c4bc733

Added to database: 1/23/2026, 3:36:20 PM

Last enriched: 1/23/2026, 3:51:39 PM

Last updated: 2/7/2026, 12:44:22 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats