Cyber Posture

CVE-2026-22284

MediumRCE

Published: 17 February 2026

Published
17 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 26.1th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22284 is a medium-severity Command Injection (CWE-77) vulnerability in Dell Smartfabric Os10. Its CVSS base score is 6.6 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection (CWE-77) in a remotely accessible Dell OS10 appliance directly enables remote exploitation of a public-facing app (T1190) and arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell SmartFabric OS10 Software, versions prior to 10.5.6.12, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution.

Deeper analysisAI

CVE-2026-22284 is an Improper Neutralization of Special Elements used in a Command (command injection) vulnerability, classified under CWE-77, affecting Dell SmartFabric OS10 Software in versions prior to 10.5.6.12. Published on 2026-02-17, it has a CVSS v3.1 base score of 6.6 (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating medium severity with network accessibility but high attack complexity and requirements for high privileges.

A high-privileged attacker with remote access can exploit this vulnerability over the network to achieve arbitrary command execution on the affected system. Successful exploitation could result in high impacts to confidentiality, integrity, and availability, allowing the attacker to potentially compromise the device's functionality and data.

Dell's security advisory DSA-2026-033, detailed at https://www.dell.com/support/kbdoc/en-us/000429181/dsa-2026-033-security-update-for-dell-networking-os10-vulnerabilities, addresses this and related vulnerabilities in Dell Networking OS10, recommending upgrades to version 10.5.6.12 or later for mitigation.

Details

CWE(s)

Affected Products

dell
smartfabric os10
≤ 10.5.6.12

CVEs Like This One

CVE-2025-22472Same product: Dell Smartfabric Os10
CVE-2025-22473Same product: Dell Smartfabric Os10
CVE-2025-46427Same product: Dell Smartfabric Os10
CVE-2024-48830Same product: Dell Smartfabric Os10
CVE-2025-46428Same product: Dell Smartfabric Os10
CVE-2024-49561Same product: Dell Smartfabric Os10
CVE-2024-48013Same product: Dell Smartfabric Os10
CVE-2024-48831Same product: Dell Smartfabric Os10
CVE-2024-49559Same product: Dell Smartfabric Os10
CVE-2026-23778Same vendor: Dell

References