Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26359: CWE-73: External Control of File Name or Path in Dell Unisphere for PowerMax

0
High
VulnerabilityCVE-2026-26359cvecve-2026-26359cwe-73
Published: Thu Feb 19 2026 (02/19/2026, 08:34:01 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Unisphere for PowerMax

Description

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the ability to overwrite arbitrary files.

AI-Powered Analysis

AILast updated: 02/19/2026, 09:10:49 UTC

Technical Analysis

CVE-2026-26359 is an External Control of File Name or Path vulnerability (CWE-73) identified in Dell Unisphere for PowerMax, specifically version 10.2. This vulnerability allows a low-privileged attacker with remote network access to manipulate file paths or names used by the application, enabling arbitrary file overwrite on the underlying system. The flaw arises because the application does not properly validate or sanitize user-controlled input that influences file path construction, leading to path traversal or file overwrite conditions. Exploitation does not require user interaction and can be performed remotely with low privileges, increasing the attack surface. The CVSS 3.1 base score of 8.8 reflects high confidentiality, integrity, and availability impacts, as overwriting critical files can lead to data breaches, system compromise, or denial of service. Although no public exploits are reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. Dell Unisphere for PowerMax is a management interface for PowerMax storage arrays, widely used in enterprise data centers for critical storage operations, making this vulnerability particularly concerning for organizations relying on these systems for data availability and integrity.

Potential Impact

For European organizations, the impact of CVE-2026-26359 can be severe. Exploitation could lead to unauthorized modification or destruction of critical configuration files or data on storage management systems, potentially causing data loss, service disruption, or unauthorized data disclosure. Enterprises in finance, healthcare, telecommunications, and government sectors that depend on Dell PowerMax storage arrays for high-availability and secure data storage are especially vulnerable. Disruption of storage management could cascade to broader IT infrastructure outages, impacting business continuity and regulatory compliance (e.g., GDPR). The ability for a low-privileged remote attacker to cause such damage increases the risk profile, as insider threats or compromised low-level accounts could leverage this vulnerability. Additionally, the lack of user interaction requirement facilitates automated exploitation attempts, increasing the likelihood of attacks once exploit code becomes available.

Mitigation Recommendations

Immediate mitigation steps include restricting remote access to Dell Unisphere for PowerMax management interfaces through network segmentation, firewalls, and VPNs to limit exposure. Organizations should enforce strict access controls and monitor for unusual file modification activities on storage management systems. Input validation and sanitization should be reviewed and enhanced where possible to prevent path traversal or file overwrite attempts. Since no patches are currently listed, organizations must stay alert for vendor updates and apply security patches promptly once released. Implementing file integrity monitoring and regular backups of critical configuration and data files can aid in rapid recovery if exploitation occurs. Additionally, conducting thorough security audits and penetration testing on storage management platforms can help identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-02-13T18:05:27.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996d0406aea4a407a4bdbf4

Added to database: 2/19/2026, 8:56:32 AM

Last enriched: 2/19/2026, 9:10:49 AM

Last updated: 2/21/2026, 12:22:03 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats