CVE-2026-22762
Description
Dell Avamar Server and Avamar Virtual Edition, versions prior to 19.10 SP1 with CHF338912, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Security. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary file delete.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Dell Avamar Server and Avamar Virtual Edition prior to 19.10 SP1 with CHF338912 contain a path traversal vulnerability allowing high-privileged remote attackers to delete arbitrary files.
Vulnerability
Overview
CVE-2026-22762 is an improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in the Security component of Dell Avamar Server and Avamar Virtual Edition. Affected versions range from 19.9 through 19.10 SP1 before the inclusion of CHF338912. The root cause is insufficient validation of user-supplied file paths, enabling an attacker to escape the intended directory and target files outside the restricted scope [1].
Exploitation
Conditions
Exploitation requires a high-privileged attacker with remote network access. The CVSS v3.1 vector (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H) indicates that no user interaction is needed and the attack complexity is low. The attacker must already possess elevated privileges (e.g., administrative credentials) within the Avamar environment, but can then leverage the path traversal to specify arbitrary file paths for deletion [1].
Impact
Successful exploitation leads to arbitrary file deletion on the affected system. This can disrupt backup operations, delete critical configuration files, or cause denial of service. The CVSS score of 6.5 (Medium) reflects the high integrity and availability impact, though confidentiality is not directly compromised [1].
Mitigation
Dell has released a fix in Avamar Server and Avamar Virtual Edition version 19.10 SP1 with CHF338912. The Dell PowerProtect DP Series Appliance (IDPA) is also affected and remediated in version 2.7.8 with the same cumulative hotfix. Users should apply the update from the Dell support portal as soon as possible [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: < 19.10 SP1 with CHF338912
- Range: < 19.10 SP1 with CHF338912
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.