Dell AppSync 4.6.0 Symlink Following CVE-2026-22767
CVE-2026-22767 Published on April 1, 2026
Dell AppSync, version(s) 4.6.0, contain(s) an UNIX Symbolic Link (Symlink) Following vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering.
Vulnerability Analysis
CVE-2026-22767 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a high impact on integrity and availability.
Weakness Type
What is a Symlink following Vulnerability?
The software, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the software to operate on unauthorized files. A software system that allows UNIX symbolic links (symlink) as part of paths whether in internal code or through user input can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read/write/corrupt a file that they originally did not have permissions to access.
CVE-2026-22767 has been classified to as a Symlink following vulnerability or weakness.
Products Associated with CVE-2026-22767
Want to know whenever a new CVE is published for Dell Appsync? stack.watch will email you.
Affected Versions
Dell AppSync:- Before 4.6.1.0 or later is affected.