CVE-2022-22557

7.5 HIGH

📋 TL;DR

Dell PowerStore storage systems store certain user credentials in plain text, allowing locally authenticated attackers to read sensitive passwords. This affects PowerStore X & T environments running vulnerable versions, potentially enabling attackers to gain unauthorized access with compromised account privileges.

💻 Affected Systems

Products:
  • Dell PowerStore X
  • Dell PowerStore T
Versions: 2.0.0.x and 2.0.1.x
Operating Systems: PowerStore OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PowerStore X and T models in specific version ranges. Requires local authentication to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to PowerStore management interface, potentially compromising the entire storage infrastructure and accessing sensitive data.

🟠

Likely Case

Attackers obtain credentials for standard user accounts, allowing unauthorized access to storage management functions and potentially sensitive data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the local system with minimal lateral movement potential.

🌐 Internet-Facing: LOW - This requires local authentication, making internet-facing exploitation unlikely unless management interfaces are improperly exposed.
🏢 Internal Only: HIGH - Internal attackers with local access can exploit this vulnerability to escalate privileges and compromise storage systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability involves reading plain-text credentials from storage locations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.0.0 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/000196367

Restart Required: Yes

Instructions:

1. Backup PowerStore configuration. 2. Download PowerStoreOS 2.1.0.0 or later from Dell Support. 3. Apply update via PowerStore Manager. 4. System will automatically restart during update process. 5. Verify update completion in PowerStore Manager.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and logical access to PowerStore systems to authorized personnel only.

Network Segmentation

all

Isolate PowerStore management interfaces from general network access.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can authenticate locally to PowerStore systems
  • Monitor authentication logs for suspicious access patterns and credential usage

🔍 How to Verify

Check if Vulnerable:

Check PowerStore version in PowerStore Manager under System > Software. If version is 2.0.0.x or 2.0.1.x, system is vulnerable.

Check Version:

In PowerStore Manager: System > Software > Version Information

Verify Fix Applied:

Verify PowerStore version is 2.1.0.0 or later in PowerStore Manager. Check that credential storage mechanisms no longer contain plain-text passwords.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • Unusual access patterns to credential storage locations
  • Authentication from unexpected user accounts

Network Indicators:

  • Unusual management interface access patterns
  • Traffic to PowerStore systems from unauthorized sources

SIEM Query:

source="PowerStore" AND (event_type="authentication" AND result="success" AND user NOT IN authorized_users) OR (event_type="file_access" AND file_path CONTAINS "credentials")

🔗 References

📤 Share & Export