Cyber Posture

CVE-2026-22267

High

Published: 19 February 2026

Published
19 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0002 6.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22267 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Dell Powerprotect Data Manager. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of the specific incorrect privilege assignment flaw in Dell PowerProtect Data Manager versions prior to 19.22, preventing exploitation.

prevent

Enforces the principle of least privilege to restrict low-privileged remote attackers from escalating privileges due to incorrect assignment.

prevent

Mandates enforcement of approved access authorizations, blocking unauthorized actions from privilege escalation exploits.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct privilege escalation from low-privileged remote access due to incorrect privilege assignment.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

Deeper analysisAI

CVE-2026-22267 is an Incorrect Privilege Assignment vulnerability (CWE-266) in Dell PowerProtect Data Manager versions prior to 19.22. Published on 2026-02-19T10:16:11.800, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and low privileges required for exploitation.

A low-privileged attacker with remote access can exploit this vulnerability to achieve elevation of privileges. Successful exploitation allows the attacker to perform unauthorized actions, resulting in high impacts to integrity and availability, though confidentiality remains unaffected.

Dell's security advisory DSA-2026-046 addresses this and other vulnerabilities in PowerProtect Data Manager. Practitioners should refer to the advisory at https://www.dell.com/support/kbdoc/en-us/000429778/dsa-2026-046-security-update-for-dell-powerprotect-data-manager-multiple-vulnerabilities for details on patches and mitigation recommendations.

Details

CWE(s)

Affected Products

dell
powerprotect data manager
≤ 19.22

CVEs Like This One

CVE-2026-27102Same vendor: Dell
CVE-2026-22266Same product: Dell Powerprotect Data Manager
CVE-2024-49561Same vendor: Dell
CVE-2026-21425Same vendor: Dell
CVE-2026-32655Same vendor: Dell
CVE-2025-21105Same vendor: Dell
CVE-2026-25906Same vendor: Dell
CVE-2026-23857Same vendor: Dell
CVE-2026-35155Same vendor: Dell
CVE-2026-24510Same vendor: Dell

References