7.2
CVE-2026-24506
- EPSS 0.11%
- Veröffentlicht 20.04.2026 16:22:37
- Zuletzt bearbeitet 28.04.2026 21:04:04
- Quelle security_alert@emc.com
- CVE-Watchlists
- Unerledigt
Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.6, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain an OS command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dell ≫ Powerprotect Dp Series Appliance Version < 2.7.9
Dell ≫ Data Domain Operating System Version >= 7.7.1.0 < 7.13.1.70
Dell ≫ Data Domain Operating System Version >= 7.14.0.0 < 8.3.1.30
Dell ≫ Data Domain Operating System Version >= 8.4.0.0 < 8.6.1.0
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.11% | 0.285 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security_alert@emc.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.