Dell PowerProtect Data Domain Flaws Expose Systems to Unauthorized Access and Root RCE
Dell disclosed two high-severity vulnerabilities in PowerProtect Data Domain appliances running multiple DD OS releases, including a weak-credentials flaw tracked as CVE-2026-23853 and a missing-authentication issue tracked as CVE-2026-26944. The weak-credentials vulnerability affects Feature Release versions 7.7.1.0 through 8.5, LTS2025 8.3.1.0 through 8.3.1.20, and LTS2024 7.13.1.0 through 7.13.1.50, and could allow an unauthenticated attacker with local access to gain unauthorized access to the system. The issue is classified as CWE-1391 and carries a CVSS v3.1 score vector of AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
Dell also reported CVE-2026-26944, a missing authentication for critical function flaw classified as CWE-306, which could allow an unauthenticated remote attacker to execute arbitrary commands with root privileges if an authenticated user performs a specific action. That vulnerability is rated with the CVSS v3.1 vector AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. Both issues were referenced in Dell security guidance, including advisory DSA-2026-060, and affect backup infrastructure that may be critical to recovery operations, making remediation and version review a priority for defenders.
Timeline
Apr 20, 2026
Dell discloses remote root command execution flaw CVE-2026-26944
Dell disclosed CVE-2026-26944, a missing authentication for critical function vulnerability affecting multiple PowerProtect Data Domain versions. Dell said the issue could allow an unauthenticated remote attacker to execute arbitrary commands as root if an authenticated user performs a specific action.
Apr 17, 2026
Dell discloses weak-credentials flaw CVE-2026-23853 in DD OS
Dell disclosed CVE-2026-23853, a weak credentials vulnerability affecting multiple PowerProtect Data Domain DD OS releases. The flaw could allow an unauthenticated attacker with local access to gain unauthorized access, and Dell referenced security advisory DSA-2026-060.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Organizations
Affected Products
Sources
Related Stories

Dell PowerProtect Data Domain OS and PowerDNS Flaws Prompt New dCERT Alerts
dCERT issued multiple advisories for **Dell PowerProtect Data Domain OS** and **PowerDNS**, highlighting newly tracked security flaws across both products. For Dell backup appliances, advisory `2026-1097` reported multiple vulnerabilities in PowerProtect Data Domain OS, followed by advisory `2026-1218`, which specifically warned that a vulnerability in the platform could allow **code execution**. dCERT also published two separate advisories on **PowerDNS**—`2026-1204` and `2026-1215`—each describing multiple vulnerabilities affecting the DNS software. The notices indicate a concentrated wave of disclosures affecting enterprise backup infrastructure and DNS services, with the Dell issue standing out because of its potential to let attackers execute code on vulnerable systems.
1 weeks ago
Dell Issues Security Advisories for PowerEdge, PowerProtect, Connectrix, and Networking Products
Dell released multiple security advisories covering vulnerabilities across a broad set of enterprise infrastructure products, and the Canadian Centre for Cyber Security urged organizations to review the notices and apply updates. The affected technologies span storage, networking, data protection, and server platforms, including **Connectrix Switches and Directors**, **AMD-based PowerEdge Servers**, **Dell Command | Update** versions prior to `5.7.0`, **PowerProtect Data Domain**, and **Dell Storage Manager - Replay Manager for Microsoft Servers** versions prior to `8.0.3`. Additional advisories also affected **Data Protection Advisor**, **Dell EMC Isilon OneFS**, **Dell EMC PowerScale**, **Dell Networking OS10**, **PowerProtect DP Series Appliance**, **Elastic Cloud Storage**, **ObjectScale**, and several **PowerSwitch** models. The Canadian notice linked Dell advisories including `DSA-2026-041`, `DSA-2026-171`, `DSA-2026-058`, and `DSA-2026-190`, and characterized the activity as a vendor patch and mitigation effort rather than evidence of active exploitation.
5 days ago
Critical Privilege Escalation Vulnerability in Dell Data Lakehouse (CVE-2025-46608)
A critical vulnerability, tracked as CVE-2025-46608, has been identified in Dell Data Lakehouse versions prior to 1.6.0.0. This flaw is due to improper access control, allowing a high-privileged attacker with remote access to escalate privileges within the system. The vulnerability is rated as critical with a CVSS score of 9.1, and exploitation could result in unauthorized access, compromise of system integrity, and exposure of customer data. Dell has advised all customers to upgrade to the latest version immediately to mitigate the risk. Security advisories emphasize the urgency of patching affected systems, as the vulnerability is remotely exploitable and could be leveraged to gain elevated privileges. No specific affected product versions have been listed beyond the general guidance to update any installations prior to version 1.6.0.0. Organizations using Dell Data Lakehouse should prioritize remediation to prevent potential exploitation and data breaches.
1 months ago