Skip to content
Threat Feed
medium advisory

Dell ECS and ObjectScale Sensitive Information Logging Vulnerability (CVE-2026-28261)

Dell Elastic Cloud Storage and ObjectScale are vulnerable to local privilege escalation due to sensitive information being logged, potentially allowing a low-privileged attacker with local access to expose secrets and gain unauthorized access.

Dell Elastic Cloud Storage (ECS) version 3.8.1.7 and prior, and Dell ObjectScale versions prior to 4.1.0.3 and version 4.2.0.0, are vulnerable to sensitive information being logged. Identified as CVE-2026-28261, this vulnerability allows a low-privileged attacker with local access to potentially expose secrets stored within log files. Successful exploitation could allow the attacker to escalate their privileges and access the vulnerable system with the privileges of the compromised account. This vulnerability requires local access to the system and poses a risk to organizations using the affected Dell products where appropriate access controls are not in place.

Attack Chain

  1. Attacker gains low-privileged local access to the Dell ECS or ObjectScale system. This could be achieved through various means, such as compromising a user account or leveraging an existing vulnerability.
  2. Attacker identifies the location of the log files generated by the affected Dell product. The default location may be known or discovered through system enumeration.
  3. Attacker accesses and examines the log files. Due to the vulnerability, sensitive information, such as passwords, API keys, or other credentials, may be inadvertently written to these logs.
  4. Attacker extracts the exposed sensitive information from the log files.
  5. Attacker uses the extracted credentials to authenticate to the Dell ECS or ObjectScale system.
  6. Attacker escalates their privileges using the compromised account.
  7. Attacker gains unauthorized access to sensitive data stored within the system, modifies configurations, or performs other malicious activities.

Impact

Successful exploitation of CVE-2026-28261 allows a low-privileged attacker to escalate their privileges and gain unauthorized access to the Dell ECS or ObjectScale system. This can lead to data breaches, unauthorized modifications, and other malicious activities. The severity of the impact depends on the level of access granted to the compromised account and the sensitivity of the data stored within the system.

Recommendation

  • Upgrade Dell ObjectScale to version 4.1.0.3 or later to remediate CVE-2026-28261 as mentioned in the Dell advisory [https://www.dell.com/support/kbdoc/en-us/000449325/dsa-2026-143-security-update-for-dell-objectscale-prior-to-4-1-0-3-and-4-2-0-0-insertion-of-sensitive-information-into-log-file-vulnerability].
  • Implement strict access control policies to limit local access to the Dell ECS and ObjectScale systems.
  • Regularly review and monitor log files for any signs of unauthorized access or suspicious activity. Use the rule below to identify access to sensitive log files.
  • Implement proper credential management practices, such as regularly rotating passwords and using strong encryption to protect sensitive information.

Detection coverage 2

Detect Access to Sensitive Log Files

medium

Detects access attempts to sensitive log files that may contain leaked secrets.

sigma tactics: credential_access techniques: T1003 sources: file_event, linux

Detect Configuration File Access

medium

Detects access attempts to sensitive configuration files that may contain leaked secrets.

sigma tactics: credential_access techniques: T1003 sources: file_event, linux

Detection queries are kept inside the platform. Get full rules →