CVE-2026-24505
Published: 20 April 2026
Summary
CVE-2026-24505 is a high-severity Improper Input Validation (CWE-20) vulnerability in Dell PowerProtect Data (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates information input validation at defined points, addressing the core improper input validation (CWE-20) that enables arbitrary root command execution in this CVE.
Requires timely identification, reporting, and remediation of flaws like CVE-2026-24505 via patching as detailed in Dell Security Advisory DSA-2026-060.
Enforces least privilege to minimize high-privilege (PR:H) accounts with remote access capable of exploiting this vulnerability for root command execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote network-accessible improper input validation directly enables arbitrary command execution as root on a public-facing appliance (T1190), with the high-privileged starting context and root outcome mapping to exploitation for privilege escalation (T1068) and Unix shell command execution (T1059.004).
NVD Description
Dell PowerProtect Data Domain, versions 8.5 through 8.6 contain an improper input validation vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.
Deeper analysisAI
CVE-2026-24505 is an improper input validation vulnerability (CWE-20) in Dell PowerProtect Data Domain, affecting versions 8.5 through 8.6. Published on 2026-04-20T17:16:31.920, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts.
A high-privileged attacker with remote access can exploit this vulnerability to execute arbitrary commands with root privileges on the affected system. The attack requires high privileges (PR:H) but low complexity (AC:L), no user interaction (UI:N), and is feasible over the network (AV:N) without scope changes (S:U).
Dell Security Advisory DSA-2026-060 provides details on mitigation, including a security update addressing this and multiple other vulnerabilities in PowerProtect Data Domain; practitioners should consult https://www.dell.com/support/kbdoc/en-us/000450699/dsa-2026-060-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities for patch deployment instructions.
Details
- CWE(s)