Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection in Dell PowerProtect Data Domain Enables Arbitrary Root Execution |
Mon, 20 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.6, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain an OS command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2026-04-20T18:09:44.869Z
Reserved: 2026-01-23T06:07:21.818Z
Link: CVE-2026-24506
Updated: 2026-04-20T18:09:38.621Z
Status : Received
Published: 2026-04-20T17:16:32.050
Modified: 2026-04-20T17:16:32.050
Link: CVE-2026-24506
No data.
OpenCVE Enrichment
Updated: 2026-04-20T17:30:12Z