Dell Vulnerabilities
Comprehensive security vulnerability database for Dell products
9
0
7
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-25907 | 7.5 | An attacker can exploit a flaw in Dell PowerScale OneFS to lock out user accounts, causing a denial of service that prevents legitimate users from accessing the system. This requires the attacker to have remote access, but they do not need to be authenticated to take advantage of this vulnerability. | dellpowerscale onefs | Theoretical | about 1 month agoMar 4, 2026 |
| CVE-2026-22270 | 6.7 | This vulnerability allows a high-privileged attacker with local access to the Dell PowerScale OneFS system to potentially disrupt services, gain higher access rights, or access sensitive information. It affects specific versions of the software, so users running outdated versions are at risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21426 | 6.7 | This vulnerability allows a high-privileged attacker with local access to the Dell PowerScale OneFS system to potentially cause a denial of service, gain higher privileges, or access sensitive information. It affects specific versions of the software, so systems running outdated versions are at risk. | dellpowerscale onefs | Theoretical | about 1 month agoMar 4, 2026 |
| CVE-2026-21425 | 7.8 | An attacker with low-level access to a Dell PowerScale OneFS system could exploit a flaw to gain higher privileges, allowing them to perform unauthorized actions. This vulnerability affects specific versions of the software, so it’s crucial to ensure you are running an updated version to protect against this risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21424 | 6.7 | An attacker with local access to Dell PowerScale OneFS can exploit a flaw to gain higher privileges than intended, potentially allowing them to execute unauthorized actions on the system. This vulnerability affects specific versions of the software, so users should ensure they are running the latest updates to mitigate the risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21423 | 6.7 | An attacker with high privileges and local access to Dell PowerScale OneFS could exploit a flaw in default permissions to run malicious code, crash the system, gain higher access rights, or steal sensitive information. This vulnerability affects specific versions of the software, so it’s crucial to ensure you’re running an updated version to mitigate the risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21422 | 6.7 | This vulnerability allows a highly privileged attacker with local access to bypass security protections on Dell PowerScale OneFS, potentially compromising the system's integrity. To exploit this issue, the attacker must already have elevated access to the system, making it a concern primarily for environments where local access is not well controlled. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21421 | 6.7 | This vulnerability allows a high-privileged attacker with local access to the Dell PowerScale OneFS system to gain even higher privileges, potentially giving them more control over the system. To exploit this, the attacker must already have local access to the device, making it a risk primarily in environments where physical security is not tightly controlled. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21420 | 7.8 | This vulnerability allows an attacker with low-level access to the Dell Repository Manager to run their own code on the system, potentially gaining higher privileges. To exploit this, the attacker needs to have local access to the system where the software is installed. | dellrepository manager | Exploit Available | about 1 month agoFeb 23, 2026 |
About Dell Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Dell products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.