Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28265: CWE-35: Path Traversal in Dell PowerStore

0
Medium
VulnerabilityCVE-2026-28265cvecve-2026-28265cwe-35
Published: Wed Apr 01 2026 (04/01/2026, 07:41:28 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerStore

Description

CVE-2026-28265 is a path traversal vulnerability in Dell PowerStore affecting the Service user. A low-privileged attacker with local access can exploit this flaw to modify arbitrary system files. The vulnerability does not require user interaction and has a CVSS score of 4. 4, indicating medium severity. Exploitation could impact system integrity and availability but not confidentiality. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability arises from improper validation of file paths, allowing traversal outside intended directories. Organizations using Dell PowerStore should restrict local access and monitor for suspicious file modifications. This threat primarily affects environments where Dell PowerStore is deployed, notably in countries with significant Dell enterprise storage market presence. Immediate mitigation steps include applying vendor patches once available and implementing strict access controls on local users.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 08:23:36 UTC

Technical Analysis

CVE-2026-28265 is a path traversal vulnerability identified in Dell PowerStore, a storage appliance product. The vulnerability is classified under CWE-35, indicating improper neutralization of special elements in file paths. Specifically, the flaw exists in the Service user component of PowerStore, where insufficient validation of file path inputs allows a low-privileged local attacker to traverse directories beyond the intended scope. This traversal can lead to unauthorized modification of arbitrary system files, potentially impacting system integrity and availability. The vulnerability requires local access with low privileges but does not require user interaction, making it exploitable by an attacker who has already gained some level of access to the system. The CVSS 3.1 base score is 4.4, reflecting a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). No known exploits are currently reported in the wild, and no patches have been released at the time of publication. The vulnerability could be leveraged to modify critical system files, potentially leading to system instability or denial of service. Organizations using Dell PowerStore should be aware of this vulnerability and prepare to apply patches or mitigations once available.

Potential Impact

The primary impact of CVE-2026-28265 is on system integrity and availability within Dell PowerStore environments. An attacker exploiting this vulnerability can modify arbitrary system files, which may lead to system misconfiguration, service disruption, or denial of service conditions. Although confidentiality is not directly impacted, the integrity compromise could facilitate further attacks or system instability. Since exploitation requires local access with low privileges, the threat is limited to insiders or attackers who have already breached perimeter defenses. However, in environments where PowerStore is critical for data storage and operations, such disruptions could have significant operational and financial consequences. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains a latent threat. Organizations relying on Dell PowerStore for enterprise storage should consider this vulnerability a moderate risk that could affect business continuity if exploited.

Mitigation Recommendations

1. Restrict local access to Dell PowerStore systems strictly to trusted administrators and users to reduce the risk of exploitation by low-privileged attackers. 2. Implement robust monitoring and alerting for unusual file modifications or access patterns on PowerStore systems, focusing on critical system files. 3. Apply principle of least privilege to all local accounts, ensuring minimal permissions are granted. 4. Segregate management interfaces and service accounts to limit exposure. 5. Regularly audit system logs for signs of path traversal or unauthorized file access attempts. 6. Coordinate with Dell for timely patch releases and apply security updates promptly once available. 7. Consider deploying host-based intrusion detection systems (HIDS) to detect anomalous file system activities. 8. Educate administrators about the risks of local access vulnerabilities and enforce strong authentication and session management practices. These steps go beyond generic advice by focusing on access control, monitoring, and proactive coordination with the vendor.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-02-25T18:04:25.462Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ccd270e6bfc5ba1daa6537

Added to database: 4/1/2026, 8:08:16 AM

Last enriched: 4/1/2026, 8:23:36 AM

Last updated: 4/1/2026, 9:29:24 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses