Cyber Posture

CVE-2026-21418

High

Published: 30 January 2026

Published
30 January 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21418 is a high-severity OS Command Injection (CWE-78) vulnerability in Dell Unity Operating Environment. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses this CVE by applying Dell's security update to patch the OS command injection vulnerability, preventing arbitrary root command execution.

prevent

Information input validation neutralizes special elements in user inputs before passing to OS commands, comprehensively mitigating OS command injection exploits.

prevent

Least privilege restricts low-privileged local accounts from accessing vulnerable interfaces or limits damage from escalated root execution.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local OS command injection (CWE-78) directly enables privilege escalation from low-priv user to root via arbitrary command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with…

more

root privileges.

Deeper analysisAI

CVE-2026-21418 is an improper neutralization of special elements used in an OS command, classified as an OS Command Injection vulnerability (CWE-78), affecting Dell Unity versions 5.5.2 and prior. Published on 2026-01-30, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), highlighting its potential for high confidentiality, integrity, and availability impacts.

A low-privileged attacker with local access to the system can exploit this vulnerability to achieve arbitrary command execution with root privileges, potentially compromising the entire storage system.

Dell advisory DSA-2026-054 provides a security update addressing this and multiple other vulnerabilities in Dell Unity, Dell UnityVSA, and Dell Unity XT. Security practitioners should consult the advisory at https://www.dell.com/support/kbdoc/en-us/000421197/dsa-2026-054-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities for patch details and mitigation guidance.

Details

CWE(s)

Affected Products

dell
unity operating environment
≤ 5.5.3.0

CVEs Like This One

CVE-2025-24385Same product: Dell Unity Operating Environment
CVE-2026-22277Same product: Dell Unity Operating Environment
CVE-2025-23383Same product: Dell Unity Operating Environment
CVE-2025-24378Same product: Dell Unity Operating Environment
CVE-2025-24386Same product: Dell Unity Operating Environment
CVE-2025-24379Same product: Dell Unity Operating Environment
CVE-2024-49565Same product: Dell Unity Operating Environment
CVE-2025-24377Same product: Dell Unity Operating Environment
CVE-2025-24380Same product: Dell Unity Operating Environment
CVE-2024-49564Same product: Dell Unity Operating Environment

References