CVE-2026-26358

8.8 HIGH

📋 TL;DR

Dell Unisphere for PowerMax versions 10.2 contain a missing authorization vulnerability that allows low-privileged remote attackers to gain unauthorized access. This affects organizations using Dell Unisphere for PowerMax storage management software. Attackers could potentially access sensitive storage management functions they shouldn't have permission to use.

💻 Affected Systems

Products:
  • Dell Unisphere for PowerMax
Versions: 10.2
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have low-privileged remote access to the Unisphere interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative control over PowerMax storage systems, potentially accessing, modifying, or deleting critical storage data and configurations.

🟠

Likely Case

Low-privileged users could escalate privileges to perform unauthorized storage management operations, potentially disrupting storage services or accessing sensitive data.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to authorized users gaining additional privileges within their existing access scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing low-privileged access but authorization bypass is typically straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply security update from DSA-2026-102

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000429268/dsa-2026-102-dell-unisphere-for-powermax-and-powermax-eem-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the security update from Dell Support 2. Apply the patch following Dell's installation procedures 3. Restart Unisphere services as required

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Unisphere management interface to only authorized administrative networks

Access Control Hardening

all

Review and minimize low-privileged user accounts with access to Unisphere interface

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Unisphere management interface from general network access
  • Implement additional authentication layers and monitor for unusual privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Unisphere version via web interface or command line, verify if running version 10.2

Check Version:

Check via Unisphere web interface or consult Dell documentation for version checking commands

Verify Fix Applied:

Verify Unisphere version has been updated beyond 10.2 and check patch installation logs

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in Unisphere logs
  • Access to administrative functions from low-privileged accounts
  • Authentication logs showing unexpected access patterns

Network Indicators:

  • Unusual API calls to administrative endpoints from non-admin IPs
  • Increased traffic to sensitive management interfaces

SIEM Query:

source="unisphere" AND (event_type="privilege_escalation" OR user_role_change OR unauthorized_access_attempt)

🔗 References

📤 Share & Export