CVE-2026-26360: CWE-73: External Control of File Name or Path in Dell Unisphere for PowerMax
Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.
AI Analysis
Technical Summary
CVE-2026-26360 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in Dell Unisphere for PowerMax, specifically version 10.2. This vulnerability allows a low-privileged attacker who has remote access to the system to manipulate file paths or names externally, enabling them to delete arbitrary files on the affected system. The flaw does not require user interaction and can be exploited remotely with low complexity, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H). The vulnerability impacts the integrity and availability of the system by allowing unauthorized deletion of files, which could disrupt storage management operations or cause data loss. Dell Unisphere for PowerMax is a management software for Dell EMC PowerMax storage arrays, widely used in enterprise environments for high-performance storage solutions. Although no public exploits are currently known, the high CVSS score (8.1) reflects the serious risk posed by this vulnerability. The absence of patch links suggests that a fix may still be pending or in development. Organizations relying on this software should be vigilant and prepare to apply updates promptly once available. The vulnerability's exploitation scope is limited to those with remote access and low privileges, but the impact on critical storage infrastructure can be substantial.
Potential Impact
The potential impact of CVE-2026-26360 is significant for organizations using Dell Unisphere for PowerMax, particularly those managing critical storage infrastructure. Successful exploitation can lead to unauthorized deletion of arbitrary files, compromising the integrity and availability of storage management systems. This could result in disruption of storage operations, potential data loss, and downtime affecting business continuity. Enterprises relying on PowerMax arrays for mission-critical applications, such as financial services, healthcare, telecommunications, and government sectors, may face operational and reputational damage. The vulnerability's remote exploitability and low privilege requirement increase the risk of insider threats or attackers who have gained limited access. Although confidentiality is not directly impacted, the loss of file integrity and availability can indirectly affect data security and compliance requirements. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.
Mitigation Recommendations
1. Monitor Dell's official security advisories closely and apply patches or updates for Unisphere for PowerMax as soon as they become available. 2. Restrict remote access to the Unisphere management interface using network segmentation, firewalls, and VPNs to limit exposure to trusted users only. 3. Implement strict access controls and least privilege principles to minimize the number of users with remote access and low privileges capable of exploiting this vulnerability. 4. Employ continuous monitoring and logging of file operations and management interface activities to detect suspicious deletion attempts or unauthorized file path manipulations. 5. Conduct regular backups of critical configuration files and data managed by PowerMax systems to enable recovery in case of file deletion. 6. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous file path manipulation or deletion patterns related to Unisphere. 7. Educate administrators and security teams about this vulnerability and ensure incident response plans include scenarios involving storage management system compromise. 8. Consider temporary disabling or limiting remote management features if operationally feasible until patches are applied.
Affected Countries
United States, Germany, United Kingdom, Japan, France, Canada, Australia, Netherlands, South Korea, Singapore
CVE-2026-26360: CWE-73: External Control of File Name or Path in Dell Unisphere for PowerMax
Description
Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26360 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in Dell Unisphere for PowerMax, specifically version 10.2. This vulnerability allows a low-privileged attacker who has remote access to the system to manipulate file paths or names externally, enabling them to delete arbitrary files on the affected system. The flaw does not require user interaction and can be exploited remotely with low complexity, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H). The vulnerability impacts the integrity and availability of the system by allowing unauthorized deletion of files, which could disrupt storage management operations or cause data loss. Dell Unisphere for PowerMax is a management software for Dell EMC PowerMax storage arrays, widely used in enterprise environments for high-performance storage solutions. Although no public exploits are currently known, the high CVSS score (8.1) reflects the serious risk posed by this vulnerability. The absence of patch links suggests that a fix may still be pending or in development. Organizations relying on this software should be vigilant and prepare to apply updates promptly once available. The vulnerability's exploitation scope is limited to those with remote access and low privileges, but the impact on critical storage infrastructure can be substantial.
Potential Impact
The potential impact of CVE-2026-26360 is significant for organizations using Dell Unisphere for PowerMax, particularly those managing critical storage infrastructure. Successful exploitation can lead to unauthorized deletion of arbitrary files, compromising the integrity and availability of storage management systems. This could result in disruption of storage operations, potential data loss, and downtime affecting business continuity. Enterprises relying on PowerMax arrays for mission-critical applications, such as financial services, healthcare, telecommunications, and government sectors, may face operational and reputational damage. The vulnerability's remote exploitability and low privilege requirement increase the risk of insider threats or attackers who have gained limited access. Although confidentiality is not directly impacted, the loss of file integrity and availability can indirectly affect data security and compliance requirements. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.
Mitigation Recommendations
1. Monitor Dell's official security advisories closely and apply patches or updates for Unisphere for PowerMax as soon as they become available. 2. Restrict remote access to the Unisphere management interface using network segmentation, firewalls, and VPNs to limit exposure to trusted users only. 3. Implement strict access controls and least privilege principles to minimize the number of users with remote access and low privileges capable of exploiting this vulnerability. 4. Employ continuous monitoring and logging of file operations and management interface activities to detect suspicious deletion attempts or unauthorized file path manipulations. 5. Conduct regular backups of critical configuration files and data managed by PowerMax systems to enable recovery in case of file deletion. 6. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous file path manipulation or deletion patterns related to Unisphere. 7. Educate administrators and security teams about this vulnerability and ensure incident response plans include scenarios involving storage management system compromise. 8. Consider temporary disabling or limiting remote management features if operationally feasible until patches are applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dell
- Date Reserved
- 2026-02-13T18:05:27.826Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6996d0406aea4a407a4bdbf7
Added to database: 2/19/2026, 8:56:32 AM
Last enriched: 2/28/2026, 1:29:03 PM
Last updated: 4/4/2026, 3:13:08 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.