CVE-2026-27101
Published: 01 April 2026
Summary
CVE-2026-27101 is a medium-severity Path Traversal (CWE-22) vulnerability in Dell Secure Connect Gateway. Its CVSS base score is 4.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents path traversal exploits by requiring validation of pathnames at input points to block access to restricted directories.
Mitigates the vulnerability through timely flaw remediation, such as applying Dell's security update for affected SCG versions.
Enforces logical access controls that restrict unauthorized traversal to protected directories despite high privileges.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal (CWE-22) in network-accessible Dell SCG management application directly enables authenticated high-privileged attacker to achieve RCE by accessing restricted paths and executing arbitrary code.
NVD Description
Dell Secure Connect Gateway (SCG) 5.0 Appliance and Application version(s) 5.28.00.xx to 5.32.00.xx, contain(s) an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. A high privileged attacker within the management network could potentially exploit this vulnerability,…
more
leading to remote execution.
Deeper analysisAI
CVE-2026-27101 is an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability, certified under CWE-22, affecting Dell Secure Connect Gateway (SCG) 5.0 Appliance and Application versions 5.28.00.xx through 5.32.00.xx. Published on April 1, 2026, it has a CVSS v3.1 base score of 4.7 (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L), indicating medium severity with network accessibility, low attack complexity, but requiring high privileges.
A high-privileged attacker within the management network can exploit this path traversal flaw to achieve remote code execution. The attacker leverages insufficient pathname restrictions to access restricted directories, potentially executing arbitrary code on the affected SCG appliance or application.
Dell advisory DSA-2026-020, detailed at https://www.dell.com/support/kbdoc/en-us/000438589/dsa-2026-020-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities, addresses this and related vulnerabilities with a security update for the SCG Application and Appliance.
Details
- CWE(s)