Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26358: CWE-862: Missing Authorization in Dell Unisphere for PowerMax

0
High
VulnerabilityCVE-2026-26358cvecve-2026-26358cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 08:47:24 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Unisphere for PowerMax

Description

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

AI-Powered Analysis

AILast updated: 02/19/2026, 09:25:32 UTC

Technical Analysis

CVE-2026-26358 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Dell Unisphere for PowerMax, specifically version 10.2. The flaw arises because the software fails to properly enforce authorization checks on certain remote management functions. This allows an attacker with low privileges and remote network access to perform unauthorized actions that should be restricted, potentially leading to full compromise of the storage management environment. The vulnerability has a CVSS v3.1 base score of 8.8, indicating high severity, with attack vector as network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. No known exploits have been reported in the wild yet, but the potential for severe damage exists given the critical role of PowerMax in enterprise storage. The absence of available patches at the time of disclosure necessitates immediate compensating controls. The vulnerability could allow attackers to access sensitive data, manipulate storage configurations, or disrupt storage services, severely impacting business operations and data security.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Dell PowerMax storage solutions in enterprise and critical infrastructure sectors such as finance, telecommunications, healthcare, and government. Exploitation could lead to unauthorized data access, data corruption, or denial of service impacting business continuity and regulatory compliance (e.g., GDPR). The high impact on confidentiality, integrity, and availability means sensitive personal and corporate data could be exposed or altered, leading to financial loss, reputational damage, and legal consequences. The remote attack vector and low privilege requirement increase the likelihood of exploitation, especially in environments where network segmentation or access controls are weak. Organizations with remote management interfaces exposed or insufficiently protected are particularly vulnerable. The threat also raises concerns for supply chain security and resilience of critical European infrastructure reliant on Dell storage technologies.

Mitigation Recommendations

1. Immediately restrict network access to Dell Unisphere for PowerMax management interfaces by implementing strict firewall rules and network segmentation to limit exposure only to trusted administrators. 2. Enforce strong authentication and authorization policies, including multi-factor authentication for all management access. 3. Monitor logs and network traffic for unusual access patterns or unauthorized attempts targeting Unisphere interfaces. 4. Apply vendor patches or updates as soon as they become available to remediate the missing authorization flaw. 5. Conduct a thorough review of user privileges and remove unnecessary low-privilege accounts that could be leveraged by attackers. 6. Implement intrusion detection/prevention systems tailored to detect exploitation attempts against storage management platforms. 7. Regularly audit and test the security posture of storage management environments to identify and remediate potential weaknesses proactively. 8. Develop and rehearse incident response plans specific to storage infrastructure compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-02-13T18:05:27.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996d42f6aea4a407a4d2c54

Added to database: 2/19/2026, 9:13:19 AM

Last enriched: 2/19/2026, 9:25:32 AM

Last updated: 2/19/2026, 8:12:17 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats