Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22762: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Dell Avamar Server

0
Medium
VulnerabilityCVE-2026-22762cvecve-2026-22762cwe-22
Published: Tue Feb 17 2026 (02/17/2026, 19:53:45 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Avamar Server

Description

Dell Avamar Server and Avamar Virtual Edition, versions prior to 19.10 SP1 with CHF338912, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Security. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary file delete.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:32:54 UTC

Technical Analysis

CVE-2026-22762 is a path traversal vulnerability classified under CWE-22 found in Dell Avamar Server and Avamar Virtual Edition versions 19.9 through 19.10 SP1. The vulnerability stems from improper validation and limitation of pathname inputs within the security component of the software, allowing an attacker with high privileges and remote access to traverse directories beyond intended restrictions. This traversal can be exploited to delete arbitrary files on the affected system, impacting the integrity and availability of data and potentially disrupting backup and recovery operations. The vulnerability does not require user interaction but does require the attacker to have elevated privileges, which limits the attack surface to insiders or attackers who have already compromised credentials or elevated access. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, no user interaction, and impacts on integrity and availability but not confidentiality. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on Dell Avamar for critical backup infrastructure. The lack of available patches at the time of reporting necessitates interim mitigations and monitoring until updates are released.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized deletion of backup files or critical system files managed by Dell Avamar Server, potentially causing data loss or service disruption. Since Avamar is widely used for enterprise backup and recovery, exploitation could undermine business continuity and disaster recovery capabilities. The impact is particularly severe for sectors with stringent data retention and availability requirements such as finance, healthcare, and government. The requirement for high privileges means that the threat is more likely from insider threats or attackers who have already gained elevated access, but the remote attack vector increases risk if management interfaces are exposed externally. Disruption of backup services could delay recovery from other cyber incidents, amplifying overall risk. European organizations must consider the regulatory implications of data loss or service unavailability under GDPR and other compliance frameworks.

Mitigation Recommendations

Organizations should immediately audit and restrict remote access to Dell Avamar Server management interfaces, ensuring they are not exposed to untrusted networks. Implement strict access controls and monitor for unusual file deletion activities. Employ file integrity monitoring on backup repositories to detect unauthorized changes. Until a patch is available, consider isolating Avamar servers within secure network segments and applying network-level filtering to limit access to trusted administrators only. Review and enforce the principle of least privilege for all users with elevated access to the Avamar environment. Regularly back up Avamar configuration and data to alternate secure locations to enable recovery if deletion occurs. Stay informed on Dell’s security advisories and apply patches promptly once released. Conduct penetration testing and vulnerability assessments focused on backup infrastructure to identify and remediate similar weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-09T18:05:08.763Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699575bb80d747be205376a2

Added to database: 2/18/2026, 8:18:03 AM

Last enriched: 2/18/2026, 8:32:54 AM

Last updated: 2/21/2026, 12:22:10 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats