Powerprotect Cyber Recovery Dell Powerprotect Cyber Recovery

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Dell Powerprotect Cyber Recovery.

By the Year

In 2026 there have been 0 vulnerabilities in Dell Powerprotect Cyber Recovery. Last year, in 2025 Powerprotect Cyber Recovery had 1 security vulnerability published. Right now, Powerprotect Cyber Recovery is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 0 0.00
2023 1 8.80
2022 2 8.45

It may take a day or so for new Powerprotect Cyber Recovery vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Dell Powerprotect Cyber Recovery Security Vulnerabilities

Dell PowerProtect Cyber Recovery <19.18.0.2: Sensitive Insertion Remote Exploit
CVE-2025-26335 - April 11, 2025

Dell PowerProtect Cyber Recovery, versions prior to 19.18.0.2, contains an Insertion of Sensitive Information Into Sent Data vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.

Insertion of Sensitive Information Into Sent Data

Dell Power Protect Cyber Recovery Auth Bypass Vulnerability
CVE-2023-32465 8.8 - High - June 14, 2023

Dell Power Protect Cyber Recovery, contains an Authentication Bypass vulnerability. An attacker could potentially exploit this vulnerability, leading to unauthorized admin access to the Cyber Recovery application. Exploitation may lead to complete system takeover by an attacker.

Improper Neutralization of HTTP Headers for Scripting Syntax

Dell PowerProtect Cyber Recovery <19.11.0.2 Auth Bypass Docker Reg API
CVE-2022-34372 9.1 - Critical - September 01, 2022

Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially access and interact with the docker registry API leading to an authentication bypass. The attacker may potentially alter the docker images leading to a loss of integrity and confidentiality

authentification

Dell PowerProtect Cyber Recovery, versions prior to 19.11, contain a privilege escalation vulnerability on virtual appliance deployments
CVE-2022-32481 7.8 - High - July 07, 2022

Dell PowerProtect Cyber Recovery, versions prior to 19.11, contain a privilege escalation vulnerability on virtual appliance deployments. A lower-privileged authenticated user can chain docker commands to escalate privileges to root leading to complete system takeover.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Dell Powerprotect Cyber Recovery or by Dell? Click the Watch button to subscribe.

Dell
Vendor

subscribe