CVE-2020-26197

7.5 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 8.1.0 through 9.1.0 have an LDAP Provider vulnerability where it cannot establish TLSv1.2 connections to LDAP servers. This allows attackers to potentially intercept and decrypt authentication traffic between the cluster and LDAP servers. Only clusters using LDAP servers for authentication are affected.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.1.0 - 9.1.0
Operating Systems: OneFS
Default Config Vulnerable: ✅ No
Notes: Only affects clusters configured to use LDAP servers for authentication. Clusters using other authentication providers are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept LDAP authentication traffic, decrypt credentials, and gain unauthorized access to the PowerScale cluster with administrative privileges.

🟠

Likely Case

Attackers eavesdrop on LDAP authentication sessions to capture credentials, potentially leading to unauthorized access to the storage system.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential credential exposure without direct system compromise.

🌐 Internet-Facing: MEDIUM - If LDAP traffic traverses untrusted networks, interception risk exists, but direct internet exposure of LDAP is uncommon.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems on the same network could intercept LDAP authentication traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to intercept LDAP traffic between PowerScale cluster and LDAP servers. No authentication needed for eavesdropping.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.0 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/000185202

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Upgrade to OneFS 9.2.0 or later. 3. Verify LDAP connections are using TLSv1.2. 4. Test authentication functionality.

🔧 Temporary Workarounds

Disable LDAP Authentication

linux

Temporarily switch to local authentication or other supported authentication providers

isi auth local enable
isi auth providers modify ldap --enabled=false

Network Segmentation

all

Isolate LDAP traffic to trusted networks using VLANs or firewalls

🧯 If You Can't Patch

  • Implement network encryption at layer 2/3 (IPsec, MACsec) between PowerScale and LDAP servers
  • Monitor network traffic for LDAP interception attempts and implement strict access controls

🔍 How to Verify

Check if Vulnerable:

Check OneFS version with 'isi version' and verify LDAP authentication is configured in 'isi auth providers view ldap'

Check Version:

isi version

Verify Fix Applied:

After upgrade to 9.2.0+, verify LDAP connections with 'isi auth providers view ldap' and test authentication

📡 Detection & Monitoring

Log Indicators:

  • Failed LDAP authentication attempts
  • LDAP connection errors
  • TLS handshake failures

Network Indicators:

  • Unencrypted LDAP traffic on port 389
  • LDAP traffic with weak TLS versions

SIEM Query:

source="powerscale" AND (event="ldap_auth_failed" OR event="tls_error")

🔗 References

📤 Share & Export