CVE-2021-21594

8.2 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 8.2.2 through 9.1.0.x have a vulnerability where sensitive data can be exposed through GET requests containing sensitive query strings. This affects all administrators and users of these Dell storage systems. Attackers could potentially access confidential information transmitted via URLs.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.2 - 9.1.0.x
Operating Systems: OneFS (Dell's proprietary storage OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations within affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full disclosure of sensitive administrative credentials, configuration data, or user information leading to complete system compromise.

🟠

Likely Case

Exposure of session tokens, authentication parameters, or configuration details that could enable further attacks.

🟢

If Mitigated

Limited exposure of non-critical query parameters if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers could easily intercept sensitive query strings.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the OneFS management interface and the ability to intercept or view GET requests containing sensitive parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above 9.1.0.x (specific fixed version not specified in advisory)

Vendor Advisory: https://www.dell.com/support/kbdoc/000190408

Restart Required: Yes

Instructions:

1. Review Dell advisory 000190408. 2. Upgrade to a version above 9.1.0.x. 3. Apply the upgrade during a maintenance window. 4. Restart affected systems as required by the upgrade process.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to OneFS management interfaces to trusted networks only.

HTTPS Enforcement

all

Ensure all management traffic uses HTTPS with proper encryption to prevent query string interception.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the OneFS management interfaces.
  • Monitor network traffic for suspicious GET requests containing sensitive parameters and implement WAF rules if available.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web interface. If version is between 8.2.2 and 9.1.0.x inclusive, system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

After upgrade, verify version is above 9.1.0.x using 'isi version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests to management interfaces with sensitive parameters in query strings
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unencrypted HTTP traffic to OneFS management ports containing sensitive query parameters
  • Traffic from unexpected source IPs to management interfaces

SIEM Query:

source="OneFS" AND (url="*?password=*" OR url="*?token=*" OR url="*?auth=*")

🔗 References

📤 Share & Export