Cyber Posture

CVE-2026-23862

High

Published: 16 March 2026

Published
16 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23862 is a high-severity Command Injection (CWE-77) vulnerability in Dell ThinOS (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 21.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs to prevent improper neutralization of special elements that enable command injection.

prevent

Mandates timely remediation of identified flaws, such as applying the vendor patch to ThinOS version 2602_10.0573 or later.

prevent

Enforces least privilege to limit the impact and success of privilege escalation attempts via command injection from low-privileged local access.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local command injection (CWE-77) directly enables privilege escalation from low-privileged context on the endpoint.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell ThinOS 10 versions prior to ThinOS 2602_10.0573, contain an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Deeper analysisAI

CVE-2026-23862 is a command injection vulnerability (CWE-77) in Dell ThinOS 10 versions prior to 2602_10.0573, stemming from improper neutralization of special elements used in a command. This flaw allows malicious input to alter command execution, as rated with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts from a local, low-privilege attack with low complexity and no user interaction required.

A low-privileged attacker with local access to the affected ThinOS system can exploit this vulnerability to achieve elevation of privileges, potentially gaining higher-level control over the endpoint. Exploitation requires physical or network-based local access but no administrative rights initially, making it feasible in shared or compromised endpoint environments.

Dell Security Advisory DSA-2026-122, available at https://www.dell.com/support/kbdoc/en-us/000435801/dsa-2026-122, details the issue and recommends updating to ThinOS version 2602_10.0573 or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

Dell
ThinOS
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-46662Shared CWE-77
CVE-2025-55125Shared CWE-77
CVE-2025-64671Shared CWE-77
CVE-2025-33180Shared CWE-77
CVE-2024-53412Shared CWE-77
CVE-2025-33249Shared CWE-77
CVE-2026-30898Shared CWE-77
CVE-2025-55227Shared CWE-77
CVE-2025-33246Shared CWE-77
CVE-2024-48830Shared CWE-77

References