Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 02 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:-:*:*:* cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:application:*:*:* |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Secure Connect Gateway Path Traversal Allowing Remote Execution by Privileged Attacker | |
| First Time appeared |
Dell
Dell secure Connect Gateway |
|
| Vendors & Products |
Dell
Dell secure Connect Gateway |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dell Secure Connect Gateway (SCG) 5.0 Appliance and Application version(s) 5.28.00.xx to 5.32.00.xx, contain(s) an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. A high privileged attacker within the management network could potentially exploit this vulnerability, leading to remote execution. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2026-04-02T03:55:54.422Z
Reserved: 2026-02-17T18:05:21.466Z
Link: CVE-2026-27101
Updated: 2026-04-01T13:32:29.055Z
Status : Analyzed
Published: 2026-04-01T08:16:05.270
Modified: 2026-04-02T20:42:37.060
Link: CVE-2026-27101
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:19:13Z