{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:47:35.109","vulnerabilities":[{"cve":{"id":"CVE-2026-23857","sourceIdentifier":"security_alert@emc.com","published":"2026-02-12T03:15:47.003","lastModified":"2026-02-18T19:33:06.040","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."},{"lang":"es","value":"El Framework de Dell Update Package (DUP), versiones 23.12.00 a 24.12.00, contiene una vulnerabilidad de manejo inadecuado de permisos o privilegios insuficientes. Un atacante con privilegios bajos con acceso local podría potencialmente explotar esta vulnerabilidad, lo que lleva a una elevación de privilegios."}],"metrics":{"cvssMetricV31":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":6.0}]},"weaknesses":[{"source":"security_alert@emc.com","type":"Primary","description":[{"lang":"en","value":"CWE-280"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dell:update_package_framework:*:*:*:*:*:*:*:*","versionStartIncluding":"23.12.00","versionEndExcluding":"25.02.00","matchCriteriaId":"FA606C82-5DDD-4677-A640-C7BA6D1F7644"}]}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/en-us/000426781/dsa-2026-081-security-update-for-dell-update-package-dup-framework-vulnerability","source":"security_alert@emc.com","tags":["Vendor Advisory"]}]}}]}