Dell threat watch

Dell product CVE coverage for endpoints, servers, storage platforms, firmware, management tools, and enterprise hardware.

Vendor watch hub

What this page covers

The Dellwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Dell activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

10

Active

2

Featured

3

Unique CVEs

10

Most recent entry

Apr 27, 2026, 2:16 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Dell watch items

Showing the 10 most recent items, newest first. Each row links to the official advisory.

10 rows · sorted newest first

Operations view

alienware command center vulnerability (CVE-2026-32655)

HIGH
watchNVDCVE-2026-32655

Dell Alienware Command Center (AWCC), versions prior to 6.13.8.0, contain a Least Privilege Violation vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Apr 27, 2026, 2:16 PMOfficial source

alienware command center vulnerability (CVE-2026-25908)

HIGH
watchNVDCVE-2026-25908

Dell Alienware Command Center (AWCC), versions prior to 6.13.8.0, contain an Execution with Unnecessary Privileges vulnerability in the AWCC. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Apr 27, 2026, 1:16 PMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-26354)

CRITICAL
watchNVDCVE-2026-26354

Dell PowerProtect Data Domain with Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.6, LTS2025 release version 8.3.1.0 through 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.60, contain a stack-based Buffer Overflow vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.

Apr 22, 2026, 2:17 PMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-26942)

HIGH
watchNVDCVE-2026-26942

Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

Apr 20, 2026, 12:16 PMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-22761)

HIGH
watchNVDCVE-2026-22761

Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain a command injection vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

Apr 20, 2026, 12:16 PMOfficial source

powerprotect dp series appliance vulnerability (CVE-2026-23776)

HIGH
watchNVDCVE-2026-23776

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60, contain(s) an Improper Certificate Validation vulnerability in certificate-based login. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

Apr 17, 2026, 5:16 AMOfficial source

data domain operating system vulnerability (CVE-2025-36568)

HIGH
watchNVDCVE-2025-36568

Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain an insufficiently protected credentials vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to credential exposure. The attacker may be able to use the exposed credentials to access the system with privileges of the compromised account.

Apr 17, 2026, 4:16 AMOfficial source

powerscale onefs vulnerability (CVE-2026-27102)

HIGH
watchNVDCVE-2026-27102

Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 through 9.13.0.1, contains an incorrect privilege assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges.

Apr 8, 2026, 8:16 AMOfficial source

Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability

critical
activeCISA KEVCVE-2026-22769

Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.

Feb 17, 2026, 6:00 PMOfficial source

Dell dbutil Driver Insufficient Access Control Vulnerability

critical
activeCISA KEVCVE-2021-21551

Dell dbutil driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial-of-service (DoS), or information disclosure.

Mar 30, 2022, 7:00 PMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Dell threat watch page?

It is the Dell-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Dell watch page?

Use it to confirm whether current Dell issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Dell security issues?

Yes. ITECS can help map Dell advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.