Cyber Posture

CVE-2026-22273

High

Published: 23 January 2026

Published
23 January 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22273 is a high-severity Use of Default Credentials (CWE-1392) vulnerability in Dell Elastic Cloud Storage. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 6.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Explicitly requires changing default authenticators prior to first use, directly preventing exploitation of the default credentials vulnerability in the OS.

prevent

Mandates management of accounts including disabling unnecessary ones and changing credentials, mitigating the risk of low-privileged attackers exploiting defaults for privilege escalation.

prevent

Requires identifying, reporting, and correcting flaws like this CVE through timely patching as per the Dell advisory, eliminating the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Default credentials vulnerability (CWE-1392) with remote network access directly enables use of default accounts for initial access/priv esc and exploitation of a public-facing service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains an Use of Default Credentials vulnerability in the OS. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

Deeper analysisAI

CVE-2026-22273 is a Use of Default Credentials vulnerability (CWE-1392) affecting the operating system in Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.2.0.0. Published on January 23, 2026, it has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.

A low-privileged attacker with remote network access can exploit this vulnerability by leveraging the default credentials. Successful exploitation allows elevation of privileges, potentially granting unauthorized control over the affected systems.

Dell Security Advisory DSA-2026-047 provides details on security updates for Dell ECS and ObjectScale to address this and other vulnerabilities; practitioners should consult https://www.dell.com/support/kbdoc/en-us/000415880/dsa-2026-047-security-update-for-dell-ecs-and-objectscale-multiple-vulnerabilities for patching instructions and mitigation guidance.

Details

CWE(s)

Affected Products

dell
elastic cloud storage
3.8.1.0 — 4.2.0.0
dell
objectscale
≤ 4.2.0.0

CVEs Like This One

CVE-2026-28261Same product: Dell Elastic Cloud Storage
CVE-2026-22271Same product: Dell Elastic Cloud Storage
CVE-2026-22769Same vendor: Dell
CVE-2026-26944Same vendor: Dell
CVE-2025-34516Shared CWE-1392
CVE-2025-0482Shared CWE-1392
CVE-2026-1972Shared CWE-1392
CVE-2026-22266Same vendor: Dell
CVE-2025-26336Same vendor: Dell
CVE-2025-43995Same vendor: Dell

References