Cyber Posture

CVE-2026-24502

High

Published: 03 March 2026

Published
03 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0001 0.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24502 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Dell Command \| Intel Vpro Out Of Band. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Search Order Hijacking (T1038); ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to DLL Search Order Hijacking (T1038) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the vulnerability by requiring timely remediation of flaws through patching the affected Dell Command | Intel vPro Out of Band software.

prevent

Enforces secure configuration settings such as safe DLL search order mode to mitigate uncontrolled search path exploitation.

prevent

Enforces strict access controls on directories in the application's search path to prevent low-privileged attackers from placing malicious libraries.

MITRE ATT&CK Enterprise TechniquesAI

T1038 DLL Search Order Hijacking Persistence
Windows systems use a common method to look for required DLLs to load into a program.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CWE-427 uncontrolled search path enables local DLL search order hijacking (T1038) for privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

Deeper analysisAI

CVE-2026-24502 is an Uncontrolled Search Path Element vulnerability (CWE-427) in Dell Command | Intel vPro Out of Band, affecting versions prior to 4.7.0. Published on 2026-03-03, the issue has a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts with a changed scope.

A low-privileged attacker with local access can exploit this vulnerability, potentially leading to elevation of privileges on the affected system.

Dell Security Advisory DSA-2026-106 provides details on mitigation and patches: https://www.dell.com/support/kbdoc/en-us/000429179/dsa-2026-106.

Details

CWE(s)

Affected Products

dell
command \| intel vpro out of band
≤ 4.7.0

CVEs Like This One

CVE-2026-21420Same vendor: Dell
CVE-2026-3775Shared CWE-427
CVE-2026-32655Same vendor: Dell
CVE-2026-27102Same vendor: Dell
CVE-2025-21105Same vendor: Dell
CVE-2026-25906Same vendor: Dell
CVE-2024-9497Shared CWE-427
CVE-2024-9499Shared CWE-427
CVE-2026-23857Same vendor: Dell
CVE-2026-35155Same vendor: Dell

References