Plattform
dell
Komponente
dell-powerprotect-data-domain
Behoben in
8.6.0.0
8.6.0.0
8.6.0.0
CVE-2026-23776 describes an Improper Certificate Validation vulnerability discovered in Dell PowerProtect Data Domain. This flaw allows a low-privileged attacker with remote access to potentially escalate their privileges within the system. The vulnerability impacts versions 7.7.1.0 through 8.5, LTS2025 versions 8.3.1.0 through 8.3.1.20, and LTS2024 versions 7.13.1.0 through 7.13.1.60. Dell recommends upgrading to version 8.6.0.0 or later to resolve this issue.
Successful exploitation of CVE-2026-23776 could allow an attacker to gain elevated privileges on a vulnerable Dell PowerProtect Data Domain system. This could lead to unauthorized access to sensitive data, modification of system configurations, or even complete control of the affected appliance. Given the critical nature of data stored on Data Domain systems, this vulnerability poses a significant risk to data confidentiality, integrity, and availability. The ability to escalate privileges from a low-privileged state significantly broadens the attack surface and increases the potential for widespread compromise within an organization’s data protection infrastructure. This vulnerability highlights the importance of robust certificate validation practices in all systems handling sensitive data.
CVE-2026-23776 was publicly disclosed on 2026-04-17. The vulnerability's impact is considered high due to the potential for privilege escalation. Currently, there are no publicly available proof-of-concept exploits. It is not listed on the CISA KEV catalog at the time of writing. Organizations should prioritize patching to mitigate the risk.
Organizations heavily reliant on Dell PowerProtect Data Domain for data protection and disaster recovery are at significant risk. Specifically, environments with legacy DD OS versions (7.7.1.0–8.5) and those with less stringent certificate management practices are particularly vulnerable. Shared hosting environments utilizing Data Domain appliances also face increased risk due to the potential for cross-tenant exploitation.
• linux / server:
journalctl -u dd-authd -g 'certificate validation failed'• linux / server:
ps aux | grep -i certificate_validation• generic web:
curl -I <data_domain_ip>/login.jsp | grep 'Certificate-Transparent'disclosure
Exploit-Status
EPSS
0.01% (1% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-23776 is to upgrade Dell PowerProtect Data Domain to version 8.6.0.0 or later, which contains the fix. If immediate upgrading is not possible, consider implementing stricter certificate validation policies on the network perimeter to prevent malicious certificates from being accepted. Review and strengthen existing certificate management practices, ensuring that only trusted certificates are used for authentication. While a direct workaround is not available, implementing network segmentation can limit the potential blast radius of a successful exploit. Monitor system logs for any unusual certificate-related activity. After upgrading, confirm the fix by attempting a login with a certificate that should be rejected by the updated system.
Dell hat ein Sicherheitsupdate (DSA-2026-060) für PowerProtect Data Domain veröffentlicht. Wenden Sie das Update auf Version 8.6.0.0 oder höher an, um die (Improper Certificate Validation) Schwachstelle bei der Zertifikats-basierten Anmeldung zu beheben. Weitere Informationen zur Anwendung des Updates finden Sie in der Dell-Dokumentation.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-23776 is a HIGH severity vulnerability in Dell PowerProtect Data Domain allowing remote attackers to potentially elevate privileges through improper certificate validation.
You are affected if you are running Dell PowerProtect Data Domain versions 7.7.1.0–8.5, LTS2025 versions 8.3.1.0–8.3.1.20, or LTS2024 versions 7.13.1.0–7.13.1.60.
Upgrade to Dell PowerProtect Data Domain version 8.6.0.0 or later to remediate the vulnerability. Consider stricter certificate validation policies as an interim measure.
As of now, there are no known public exploits or active campaigns targeting CVE-2026-23776, but the potential for privilege escalation warrants caution.
Refer to the official Dell Security Advisory for details and further guidance: [https://www.dell.com/support/kbdoc/en-us/000237777/security-update-for-dell-powerprotect-data-domain-improper-certificate-validation-vulnerability]
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.