Dell threat watch

Dell product CVE coverage for endpoints, servers, storage platforms, firmware, management tools, and enterprise hardware.

Vendor watch hub

What this page covers

The Dellwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Dell activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

52

Active

2

Featured

19

Unique CVEs

20

Most recent entry

May 11, 2026, 5:16 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Dell watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

elastic cloud storage vulnerability (CVE-2026-40636)

HIGH
watchNVDCVE-2026-40636

Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains a use of hard-coded credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to filesystem access for attacker.

May 11, 2026, 5:16 AMOfficial source

elastic cloud storage vulnerability (CVE-2026-35157)

CRITICAL
watchNVDCVE-2026-35157

Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains an improper neutralization of formula elements in a CSV File vulnerability in the UI. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to remote execution.

May 11, 2026, 5:16 AMOfficial source

automation platform vulnerability (CVE-2026-32658)

HIGH
watchNVDCVE-2026-32658

Dell Automation Platform versions prior to 2.0.0.0, contains a missing authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

May 11, 2026, 5:16 AMOfficial source

dell\/alienware purchased apps vulnerability (CVE-2026-27105)

HIGH
watchNVDCVE-2026-27105

Dell/Alienware Purchased Apps, versions prior to 1.1.31.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary File Write

Apr 29, 2026, 2:16 PMOfficial source

alienware command center vulnerability (CVE-2026-32655)

HIGH
watchNVDCVE-2026-32655

Dell Alienware Command Center (AWCC), versions prior to 6.13.8.0, contain a Least Privilege Violation vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Apr 27, 2026, 2:16 PMOfficial source

alienware command center vulnerability (CVE-2026-25908)

HIGH
watchNVDCVE-2026-25908

Dell Alienware Command Center (AWCC), versions prior to 6.13.8.0, contain an Execution with Unnecessary Privileges vulnerability in the AWCC. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Apr 27, 2026, 1:16 PMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-26354)

CRITICAL
watchNVDCVE-2026-26354

Dell PowerProtect Data Domain with Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.6, LTS2025 release version 8.3.1.0 through 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.60, contain a stack-based Buffer Overflow vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.

Apr 22, 2026, 2:17 PMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-26942)

HIGH
watchNVDCVE-2026-26942

Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

Apr 20, 2026, 12:16 PMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-22761)

HIGH
watchNVDCVE-2026-22761

Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain a command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

Apr 20, 2026, 12:16 PMOfficial source

data domain operating system vulnerability (CVE-2025-46607)

HIGH
watchNVDCVE-2025-46607

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 8.4 through 8.5 contain an improper authentication vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access.

Apr 17, 2026, 7:16 AMOfficial source

data domain operating system vulnerability (CVE-2025-46606)

HIGH
watchNVDCVE-2025-46606

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 8.4 through 8.5 contain an improper restriction of excessive authentication attempts vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access.

Apr 17, 2026, 7:16 AMOfficial source

data domain operating system vulnerability (CVE-2025-46605)

HIGH
watchNVDCVE-2025-46605

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 8.4 through 8.5 contain a session fixation vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access.

Apr 17, 2026, 7:16 AMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-23776)

HIGH
watchNVDCVE-2026-23776

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60, contain(s) an Improper Certificate Validation vulnerability in certificate-based login. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

Apr 17, 2026, 5:16 AMOfficial source

data domain operating system vulnerability (CVE-2025-36568)

HIGH
watchNVDCVE-2025-36568

Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain an insufficiently protected credentials vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to credential exposure. The attacker may be able to use the exposed credentials to access the system with privileges of the compromised account.

Apr 17, 2026, 4:16 AMOfficial source

powerscale onefs vulnerability (CVE-2026-27102)

HIGH
watchNVDCVE-2026-27102

Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 through 9.13.0.1, contains an incorrect privilege assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges.

Apr 8, 2026, 8:16 AMOfficial source

Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability

critical
activeCISA KEVCVE-2026-22769

Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.

Feb 17, 2026, 6:00 PMOfficial source

Dell dbutil Driver Insufficient Access Control Vulnerability

critical
activeCISA KEVCVE-2021-21551

Dell dbutil driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial-of-service (DoS), or information disclosure.

Mar 30, 2022, 7:00 PMOfficial source

storage manager vulnerability (CVE-2017-14374)

CRITICAL
watchNVDCVE-2017-14374

The SMI-S service in Dell Storage Manager versions earlier than 16.3.20 (aka 2016 R3.20) is protected using a hard-coded password. A remote user with the knowledge of the password might potentially disable the SMI-S service via HTTP requests, affecting storage management and monitoring functionality via the SMI-S interface. This issue, aka DSM-30415, only affects a Windows installation of the Data Collector (not applicable to the virtual appliance).

Dec 5, 2017, 6:29 PMOfficial source

emc scaleio vulnerability (CVE-2017-8001)

HIGH
watchNVDCVE-2017-8001

An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.

Nov 28, 2017, 1:29 AMOfficial source

emc unisphere vulnerability (CVE-2017-14375)

CRITICAL
watchNVDCVE-2017-14375

EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system.

Oct 31, 2017, 8:29 PMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Dell threat watch page?

It is the Dell-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Dell watch page?

Use it to confirm whether current Dell issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Dell security issues?

Yes. ITECS can help map Dell advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.