Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/Critical Dell Wyse Flaws Allow Complete System Comprom
CyberSecurity News

Critical Dell Wyse Flaws Allow Complete System Comprom

A recent security analysis uncovers how chaining seemingly minor logic flaws in Dell Wyse Management Suite (WMS) On-Premises can lead to a complete system compromise. Security researchers...

Sarah simpson
Sarah simpson
March 24, 2026 3 Min Read
0 0

A recent security analysis uncovers how chaining seemingly minor logic flaws in Dell Wyse Management Suite (WMS) On-Premises can lead to a complete system compromise.

Security researchers demonstrated that combining two distinct vulnerabilities allows an unauthenticated attacker to bypass security controls and achieve remote code execution (RCE) on the management server.​

CVE-2026-22765 (CVSS 8.8): A missing authorization flaw allows a low-privileged remote attacker to escalate privileges to full administrator level.

CVE-2026-22766 (CVSS 7.2): An unrestricted file upload vulnerability enables a high-privileged remote attacker to execute arbitrary code on the underlying system.

Dell addressed these security flaws with the release of WMS version 5.5 on February 23, 2026. The vulnerabilities specifically impact the on-premises deployments of both the free Standard and paid Pro editions.

The Exploitation Chain

The path to unauthenticated remote code execution relies on stringing together device registration flaws, unprotected API endpoints, and path traversal bypasses.

The attack begins with device registration. In the default configuration of the on-premises version, an attacker can register a rogue device by submitting an empty group token.

attack chain (Source: PT Security)
attack chain (Source: PT Security)

While this places the device into a restricted quarantine group, it successfully returns a device identifier and authentication code, providing the initial foothold needed to interact with the WMS API.​

Armed with a valid device signature, the attacker can exploit improperly exposed Active Directory (AD) import routes.

By sequentially calling the importADUserGroups and addRoleToADGroup API endpoints, the attacker constructs a custom role group with administrative privileges.

The importADUsers endpoint is then manipulated to provision a new administrator account linked to this role.​ Accessing this newly created account requires overcoming an authentication barrier.

New password after reset (source: PT Security)
New password after reset (source: PT Security)

According to PTsecurity research, attackers have two distinct methods to achieve this. The first method exploits a logic flaw in the password reset function.

By importing the administrator with an empty Active Directory User Principal Name (UPN), the system’s AD user check fails, allowing the attacker to request a password reset to an external email address.

Command Execution (Source: PT Security)
Command Execution (Source: PT Security)

Alternatively, in Pro environments with LDAP configured, an attacker can supply the identifier of a compromised low-privileged domain user during the import process.

Allowing them to authenticate as the administrator using standard domain credentials.​ The final phase leverages these newly acquired administrative privileges to deploy a malicious JSP web shell.

Although the application implements filters against traditional path traversal attacks, an administrator can maliciously reconfigure the local file repository settings.

By modifying the repository path to point directly to the Tomcat web root directory and issuing an API command to restart the Tomcat service, the attacker clears the path configuration cache and bypasses all file upload restrictions.

A JSP payload can then be uploaded through an image upload route, resulting in complete unauthenticated remote code execution.​

Dell released WMS version 5.5, which rectifies these critical logic flaws and effectively breaks the exploitation chain.

System administrators managing Dell WMS On-Premises deployments must update their infrastructure immediately to secure their environments against these attack vectors.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

TeamPCP Deploys Destructive CanisterWorm Gets Iran-Focused

Next Post

HackerOne Breach: Employee Data Stolen After Navia

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us