Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dell data Domain Operating System
Dell powerprotect Dp Series Appliance |
|
| CPEs | cpe:2.3:a:dell:powerprotect_dp_series_appliance:*:*:*:*:*:*:*:* cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dell data Domain Operating System
Dell powerprotect Dp Series Appliance |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection Allowing Root Privilege Escalation in Dell PowerProtect Data Domain | |
| First Time appeared |
Dell
Dell powerprotect Data Domain |
|
| Vendors & Products |
Dell
Dell powerprotect Data Domain |
Mon, 20 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2026-04-22T03:56:05.261Z
Reserved: 2026-02-16T18:04:20.508Z
Link: CVE-2026-26942
Updated: 2026-04-21T13:29:58.965Z
Status : Analyzed
Published: 2026-04-20T17:16:32.657
Modified: 2026-04-28T21:04:13.400
Link: CVE-2026-26942
No data.
OpenCVE Enrichment
Updated: 2026-04-20T17:30:12Z