Cyber Posture

CVE-2026-22765

High

Published: 24 February 2026

Published
24 February 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22765 is a high-severity Missing Authorization (CWE-862) vulnerability in Dell Wyse Management Suite. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 19.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 mandates enforcement of approved authorizations for logical access to resources, directly addressing the missing authorization checks that enable low-privileged attackers to escalate privileges in Dell WMS.

prevent

AC-24 requires systems to determine and authorize access to resources based on defined criteria, countering inadequate permission checks exploited in this vulnerability.

prevent

AC-6 enforces least privilege to restrict low-privileged users from accessing elevated functions, limiting the scope and impact of privilege escalation due to missing authorization.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Missing authorization (CWE-862) directly enables remote privilege escalation from low-privileged access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell Wyse Management Suite, versions prior to WMS 5.5, contain a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Deeper analysisAI

CVE-2026-22765 is a Missing Authorization vulnerability (CWE-862) affecting Dell Wyse Management Suite (WMS) in versions prior to 5.5. This flaw allows unauthorized access to certain functionalities due to inadequate permission checks, earning a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with significant impacts on confidentiality, integrity, and availability.

A low-privileged attacker with remote network access can exploit this vulnerability without user interaction or high complexity. Successful exploitation enables elevation of privileges, potentially granting the attacker higher-level access within the WMS environment and compromising the confidentiality, integrity, and availability of managed systems.

Dell has published security advisory DSA-2026-103 at https://www.dell.com/support/kbdoc/en-us/000429141/dsa-2026-103, which details mitigation steps and patch information for resolving the issue in affected versions. Security practitioners should review this advisory for upgrade guidance to WMS 5.5 or later.

Details

CWE(s)

Affected Products

dell
wyse management suite
≤ 5.5

CVEs Like This One

CVE-2026-22766Same product: Dell Wyse Management Suite
CVE-2026-26358Same vendor: Dell
CVE-2024-49561Same vendor: Dell
CVE-2026-22768Same vendor: Dell
CVE-2025-27688Same vendor: Dell
CVE-2026-32655Same vendor: Dell
CVE-2026-27102Same vendor: Dell
CVE-2025-21105Same vendor: Dell
CVE-2024-48013Same vendor: Dell
CVE-2026-21418Same vendor: Dell

References