Cyber Posture

CVE-2026-26949

Medium

Published: 04 March 2026

Published
04 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0001 2.9th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26949 is a medium-severity Incorrect Authorization (CWE-863) vulnerability in Dell Device Management Agent. Its CVSS base score is 5.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-863

Periodic review and update of procedures reduces incorrect authorization implementations over time.

addresses: CWE-863

Supervision identifies cases where authorization logic incorrectly permits unauthorized actions.

addresses: CWE-863

Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.

addresses: CWE-863

The authorization process and usage restrictions help prevent incorrect authorization for remote access types.

addresses: CWE-863

Establishing configuration and connection requirements helps ensure correct rather than incorrect authorization for wireless access.

addresses: CWE-863

Establishing connection authorization processes for mobile devices helps ensure authorization decisions are correctly implemented rather than incorrect.

addresses: CWE-863

Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.

addresses: CWE-863

Ensures authorization decisions for external system use are correctly implemented and enforced.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Incorrect authorization vulnerability enabling local privilege escalation from low-privileged context directly maps to T1068; high confidentiality impact follows from escalated access to local data.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Incorrect Authorization vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Deeper analysisAI

CVE-2026-26949, published on 2026-03-04, is an Incorrect Authorization vulnerability (CWE-863) affecting Dell Device Management Agent (DDMA) versions prior to 26.02. The issue stems from flawed authorization checks within the agent, earning a CVSS v3.1 base score of 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), indicating medium severity with local attack vector, low complexity, and low privileges required.

A low-privileged attacker with local access to the system can exploit this vulnerability to escalate privileges. Successful exploitation allows the attacker to access confidential information, as reflected in the high confidentiality impact score, without affecting integrity or availability.

Dell has published security advisory DSA-2026-105 at https://www.dell.com/support/kbdoc/en-us/000429177/dsa-2026-105, which details the vulnerability and recommends updating to DDMA version 26.02 or later to mitigate the issue.

Details

CWE(s)

Affected Products

dell
device management agent
≤ 26.02

CVEs Like This One

CVE-2024-49561Same vendor: Dell
CVE-2026-22768Same vendor: Dell
CVE-2025-27688Same vendor: Dell
CVE-2026-32655Same vendor: Dell
CVE-2026-27102Same vendor: Dell
CVE-2025-21105Same vendor: Dell
CVE-2024-48013Same vendor: Dell
CVE-2026-21418Same vendor: Dell
CVE-2025-46691Same vendor: Dell
CVE-2026-25908Same vendor: Dell

References