CVE-2026-35155
Published: 29 April 2026
Summary
CVE-2026-35155 is a high-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Dell Idrac10 Firmware. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the race condition vulnerability by requiring timely application of Dell's security update for iDRAC10.
Addresses insufficiently protected credentials by enforcing secure management, storage, and handling of authenticators to prevent exposure via race conditions.
Mitigates privilege escalation impact by ensuring low-privileged accounts have only minimal necessary access rights within the iDRAC10 interface.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Race condition exposing credentials in authenticated low-priv iDRAC interface directly enables exploitation for privilege escalation to high impacts on C/I/A.
NVD Description
Dell iDRAC10, versions 1.20.70.50 and 1.30.05.10, contains an Insufficiently Protected Credentials vulnerability. A race condition vulnerability exists that could allow an authenticated low‑privileged attacker to gain elevated access.
Deeper analysisAI
CVE-2026-35155 is an Insufficiently Protected Credentials vulnerability (CWE-522) affecting Dell iDRAC10 in versions 1.20.70.50 and 1.30.05.10. The issue stems from a race condition that exposes credentials inadequately, with a CVSS v3.1 base score of 7.1 (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). Published on 2026-04-29, it enables privilege escalation within the iDRAC10 management interface.
An authenticated attacker with low privileges can exploit this race condition over the network, though it requires high attack complexity and user interaction. Successful exploitation grants elevated access, resulting in high impacts to confidentiality, integrity, and availability.
Dell's DSA-2026-187 advisory provides a security update for iDRAC10 to address this vulnerability; details are available at https://www.dell.com/support/kbdoc/en-us/000452298/dsa-2026-187-security-update-for-dell-idrac10-vulnerability.
Details
- CWE(s)