Cyber Posture

CVE-2026-25906

High

Published: 03 March 2026

Published
03 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25906 is a high-severity Link Following (CWE-59) vulnerability in Dell Optimizer. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local symlink-following flaw in privileged Dell Optimizer process enables direct local privilege escalation from low-privileged context, matching T1068 Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell Optimizer, versions prior to 6.3.1, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Deeper analysisAI

CVE-2026-25906 is an Improper Link Resolution Before File Access vulnerability, classified under CWE-59 and also known as a 'Link Following' issue, affecting Dell Optimizer in versions prior to 6.3.1. This flaw allows improper handling of symbolic links during file access operations within the software.

A low-privileged attacker with local access to the system can exploit this vulnerability by tricking a user into interacting with a malicious link or file (as indicated by the UI:R requirement in the CVSS v3.1 vector AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, scoring 7.3 High). Successful exploitation could lead to elevation of privileges, granting the attacker higher-level access and potentially compromising confidentiality, integrity, and availability with high impact.

Dell has published advisory DSA-2026-094 detailing the issue, available at https://www.dell.com/support/kbdoc/en-us/000427608/dsa-2026-094. Mitigation involves updating Dell Optimizer to version 6.3.1 or later, as versions prior to this are vulnerable. Security practitioners should verify patch deployment and monitor for local privilege escalation attempts.

Details

CWE(s)

Affected Products

dell
optimizer
6.0.0.0 — 6.3.1.0

CVEs Like This One

CVE-2026-32655Same vendor: Dell
CVE-2026-27102Same vendor: Dell
CVE-2025-21105Same vendor: Dell
CVE-2026-23857Same vendor: Dell
CVE-2026-35155Same vendor: Dell
CVE-2026-24510Same vendor: Dell
CVE-2026-22765Same vendor: Dell
CVE-2026-26949Same vendor: Dell
CVE-2024-48013Same vendor: Dell
CVE-2024-49561Same vendor: Dell

References