Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

857+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-35155: Dell iDRAC10 Race Condition Enables Privilege Escalation
CVE-2026-35155: Dell iDRAC10 Race Condition Enables Privilege Escalation
SECURITYMEDIUMCVE-2026-35155

CVE-2026-35155: Dell iDRAC10 Race Condition Enables Privilege Escalation

Dell iDRAC10 versions 1.20.70.50 and 1.30.05.10 contain a race condition vulnerability allowing authenticated low-privileged attackers to gain elevated access through insufficiently protected credentials.

Dylan H.

Security Team

April 29, 2026
3 min read

Affected Products

  • Dell iDRAC10 versions 1.20.70.50 and 1.30.05.10

Overview

Dell has disclosed a race condition vulnerability in iDRAC10 (Integrated Dell Remote Access Controller 10) that could allow an authenticated attacker with low privileges to escalate their access on affected systems. The flaw is classified as an Insufficiently Protected Credentials vulnerability under CWE-522.

DetailValue
CVE IDCVE-2026-35155
CVSS Score7.1 (Medium)
Affected VersionsiDRAC10 1.20.70.50, 1.30.05.10
Attack VectorNetwork
Privileges RequiredLow
User InteractionNone

Technical Details

iDRAC10 is Dell's out-of-band server management interface, used widely in enterprise data centers to enable remote monitoring, configuration, and recovery of PowerEdge servers — even when the host operating system is unresponsive.

The vulnerability exists in how iDRAC10 handles credential storage and retrieval during specific concurrent operations. A race condition in the authentication and session management layer creates a narrow window during which credential context can be accessed or manipulated by a low-privileged authenticated user to obtain elevated system privileges.

Exploitation requires:

  • Network access to the iDRAC management interface
  • An existing low-privileged account on the target iDRAC instance
  • Precise timing to win the race window during concurrent operations

While exploitation requires prior authentication, the iDRAC interface is designed for remote access and is often reachable over dedicated management networks, making this a meaningful escalation path in environments where management plane access is shared.

Impact

Successful exploitation could allow an attacker to:

  • Gain access to higher-privileged iDRAC functions including full server power control
  • Read or exfiltrate sensitive configuration data, credentials, and BIOS settings
  • Modify server firmware or boot configuration
  • Potentially pivot to attached storage, networking infrastructure, or other servers managed through the same console

Because iDRAC operates below the operating system level, malicious changes made through an escalated iDRAC session can persist across OS reinstalls and are difficult to detect with standard security tooling.

Affected Products

  • Dell iDRAC10 firmware version 1.20.70.50
  • Dell iDRAC10 firmware version 1.30.05.10

iDRAC10 is included with Dell PowerEdge servers from recent generations. iDRAC9 and earlier versions are not reported as affected.

Remediation

Dell has released updated iDRAC10 firmware to address this vulnerability. Administrators should:

  1. Upgrade iDRAC10 firmware to the latest version available through Dell's support portal
  2. Restrict iDRAC network access to dedicated, isolated management VLANs
  3. Enforce strong account controls — limit the number of users with any iDRAC access
  4. Enable audit logging on iDRAC to detect unusual session activity
  5. Review existing accounts for unnecessary low-privilege users who could abuse this flaw

References

  • NVD Entry: CVE-2026-35155
  • Dell Security Advisory
#CVE#Dell#iDRAC#Privilege Escalation#Race Condition

Related Articles

CVE-2026-21515: Azure IoT Central Elevation of Privilege — CVSS 9.9 Critical

A critical CVSS 9.9 elevation of privilege vulnerability in Azure IoT Central allows an authenticated attacker to escalate privileges over a network by...

6 min read

CVE-2026-29646: OpenXiangShan NEMU RISC-V Hypervisor Privilege Escalation (CVSS 9.8)

A critical privilege escalation flaw in OpenXiangShan NEMU's RISC-V hypervisor extension allows a VS-mode guest write to the supervisor interrupt-enable...

4 min read

CVE-2025-36568: Dell PowerProtect Data Domain BoostFS Credential Exposure

A high-severity insufficiently protected credentials vulnerability in Dell PowerProtect Data Domain BoostFS allows low-privileged local attackers to...

3 min read
Back to all Security Alerts