CVE-2020-26181

7.0 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in Dell EMC Isilon OneFS and PowerScale OneFS systems. It allows a compadmin user with specific privileges to elevate to root access on SmartLock Compliance mode clusters. Affected systems include Dell EMC Isilon OneFS versions 8.1+ and Dell EMC PowerScale OneFS version 9.0.0.

💻 Affected Systems

Products:
  • Dell EMC Isilon OneFS
  • Dell EMC PowerScale OneFS
Versions: Isilon OneFS 8.1 and later, PowerScale OneFS 9.0.0
Operating Systems: OneFS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects SmartLock Compliance mode clusters. Requires compadmin user with ISI PRIV HARDENING privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compadmin access and ISI PRIV HARDENING privileges gains full root control over the cluster, enabling data theft, system compromise, and complete administrative takeover.

🟠

Likely Case

Malicious insider or compromised compadmin account escalates to root privileges, potentially accessing sensitive data and modifying system configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrative actions, though privilege boundaries are still breached.

🌐 Internet-Facing: LOW - This requires authenticated compadmin access with specific privileges, making internet-facing exploitation unlikely without prior compromise.
🏢 Internal Only: HIGH - Internal users with compadmin and ISI PRIV HARDENING privileges can exploit this vulnerability to gain root access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated compadmin access with ISI PRIV HARDENING privileges via ISI PRIV LOGIN SSH or CONSOLE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Dell Security Advisory DSA-2020-227 for specific patched versions

Vendor Advisory: https://www.dell.com/support/security/en-us/details/546720/DSA-2020-227-Dell-EMC-PowerScale-OneFS-and-Dell-EMC-Isilon-OneFS-Security-Update-for-SmartLock-Co

Restart Required: Yes

Instructions:

1. Review Dell Security Advisory DSA-2020-227. 2. Apply the recommended security update from Dell. 3. Restart affected systems as required. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict compadmin privileges

linux

Remove ISI PRIV HARDENING privileges from compadmin users to prevent exploitation

isi auth privileges modify compadmin --remove-privileges=ISI_PRIV_HARDENING

Monitor privileged access

all

Implement strict monitoring and logging of compadmin user activities and privilege escalations

🧯 If You Can't Patch

  • Immediately remove ISI PRIV HARDENING privileges from all compadmin users
  • Implement strict access controls and monitoring for compadmin accounts, including session logging and alerting for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if system is running affected OneFS versions (8.1+ for Isilon, 9.0.0 for PowerScale) and is in SmartLock Compliance mode with compadmin users having ISI PRIV HARDENING privileges.

Check Version:

isi version

Verify Fix Applied:

Verify the security update from Dell Security Advisory DSA-2020-227 is applied and compadmin users no longer have ISI PRIV HARDENING privileges.

📡 Detection & Monitoring

Log Indicators:

  • Unusual compadmin login activity
  • Privilege escalation attempts from compadmin to root
  • ISI PRIV LOGIN SSH/CONSOLE usage patterns

Network Indicators:

  • SSH connections to administrative interfaces from compadmin accounts

SIEM Query:

source="onefs_logs" AND (user="compadmin" AND (event="privilege_escalation" OR event="root_access"))

🔗 References

📤 Share & Export