CVE-2026-26362

8.1 HIGH

📋 TL;DR

Dell Unisphere for PowerMax version 10.2 contains a relative path traversal vulnerability that allows low-privileged remote attackers to modify critical system files. This affects organizations using Dell Unisphere for PowerMax management software. Attackers could potentially compromise system integrity and availability.

💻 Affected Systems

Products:
  • Dell Unisphere for PowerMax
Versions: 10.2
Operating Systems: Not specified in advisory, likely various
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low privileged remote access to the Unisphere interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through modification of critical files, leading to service disruption, data corruption, or installation of persistent backdoors.

🟠

Likely Case

Unauthorized modification of configuration files leading to service disruption or privilege escalation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent low-privileged users from reaching vulnerable interfaces.

🌐 Internet-Facing: HIGH if exposed to internet, as remote attackers can exploit without local access.
🏢 Internal Only: MEDIUM as internal attackers with low privileges could exploit, but requires network access to management interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low privileged credentials but path traversal vulnerabilities are typically straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 10.2 (check vendor advisory for specific fixed version)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000429268/dsa-2026-102-dell-unisphere-for-powermax-and-powermax-eem-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2026-102. 2. Download and apply the security update from Dell Support. 3. Restart Unisphere services as required. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Unisphere management interface to trusted networks only.

Privilege Reduction

all

Minimize number of low-privileged accounts with access to Unisphere interface.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Unisphere interface.
  • Monitor for unusual file modification activities and implement file integrity monitoring.

🔍 How to Verify

Check if Vulnerable:

Check Unisphere version via web interface or configuration files. If version is 10.2, system is vulnerable.

Check Version:

Check via Unisphere web interface or consult product documentation for version check commands.

Verify Fix Applied:

Verify Unisphere version is updated beyond 10.2 per vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file modification events in system logs
  • Multiple failed path traversal attempts in web logs

Network Indicators:

  • Unusual traffic patterns to Unisphere management interface from unexpected sources

SIEM Query:

source="unisphere.log" AND ("../" OR "..\" OR "path traversal")

🔗 References

📤 Share & Export