Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26360: CWE-73: External Control of File Name or Path in Dell Unisphere for PowerMax

0
High
VulnerabilityCVE-2026-26360cvecve-2026-26360cwe-73
Published: Thu Feb 19 2026 (02/19/2026, 08:41:00 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Unisphere for PowerMax

Description

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:29:03 UTC

Technical Analysis

CVE-2026-26360 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in Dell Unisphere for PowerMax, specifically version 10.2. This vulnerability allows a low-privileged attacker who has remote access to the system to manipulate file paths or names externally, enabling them to delete arbitrary files on the affected system. The flaw does not require user interaction and can be exploited remotely with low complexity, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H). The vulnerability impacts the integrity and availability of the system by allowing unauthorized deletion of files, which could disrupt storage management operations or cause data loss. Dell Unisphere for PowerMax is a management software for Dell EMC PowerMax storage arrays, widely used in enterprise environments for high-performance storage solutions. Although no public exploits are currently known, the high CVSS score (8.1) reflects the serious risk posed by this vulnerability. The absence of patch links suggests that a fix may still be pending or in development. Organizations relying on this software should be vigilant and prepare to apply updates promptly once available. The vulnerability's exploitation scope is limited to those with remote access and low privileges, but the impact on critical storage infrastructure can be substantial.

Potential Impact

The potential impact of CVE-2026-26360 is significant for organizations using Dell Unisphere for PowerMax, particularly those managing critical storage infrastructure. Successful exploitation can lead to unauthorized deletion of arbitrary files, compromising the integrity and availability of storage management systems. This could result in disruption of storage operations, potential data loss, and downtime affecting business continuity. Enterprises relying on PowerMax arrays for mission-critical applications, such as financial services, healthcare, telecommunications, and government sectors, may face operational and reputational damage. The vulnerability's remote exploitability and low privilege requirement increase the risk of insider threats or attackers who have gained limited access. Although confidentiality is not directly impacted, the loss of file integrity and availability can indirectly affect data security and compliance requirements. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.

Mitigation Recommendations

1. Monitor Dell's official security advisories closely and apply patches or updates for Unisphere for PowerMax as soon as they become available. 2. Restrict remote access to the Unisphere management interface using network segmentation, firewalls, and VPNs to limit exposure to trusted users only. 3. Implement strict access controls and least privilege principles to minimize the number of users with remote access and low privileges capable of exploiting this vulnerability. 4. Employ continuous monitoring and logging of file operations and management interface activities to detect suspicious deletion attempts or unauthorized file path manipulations. 5. Conduct regular backups of critical configuration files and data managed by PowerMax systems to enable recovery in case of file deletion. 6. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous file path manipulation or deletion patterns related to Unisphere. 7. Educate administrators and security teams about this vulnerability and ensure incident response plans include scenarios involving storage management system compromise. 8. Consider temporary disabling or limiting remote management features if operationally feasible until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-02-13T18:05:27.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996d0406aea4a407a4bdbf7

Added to database: 2/19/2026, 8:56:32 AM

Last enriched: 2/28/2026, 1:29:03 PM

Last updated: 4/4/2026, 3:13:08 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses