CVE-2022-23161

7.5 HIGH

📋 TL;DR

This vulnerability allows an unprivileged network attacker to cause a denial-of-service condition in Dell PowerScale OneFS SmartConnect. It affects Dell PowerScale OneFS versions 8.2.x through 9.3.0.x, potentially disrupting SmartConnect functionality and network availability.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.x - 9.3.0.x
Operating Systems: OneFS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with SmartConnect enabled. SmartConnect is typically enabled by default for load balancing and client access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of SmartConnect services, causing network connectivity issues and potential service unavailability for clients relying on SmartConnect for load balancing and failover.

🟠

Likely Case

Temporary service disruption affecting SmartConnect functionality, potentially causing client connection issues until services are restored.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unprivileged attackers from reaching vulnerable SmartConnect interfaces.

🌐 Internet-Facing: HIGH if SmartConnect interfaces are exposed to untrusted networks without proper filtering.
🏢 Internal Only: MEDIUM as internal attackers could still exploit this, but requires network access to SmartConnect interfaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to SmartConnect interfaces but no authentication. The CWE-755 (Improper Handling of Exceptional Conditions) suggests the vulnerability involves improper error handling that can be triggered remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OneFS 9.3.0.1 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/000196009

Restart Required: Yes

Instructions:

1. Review Dell advisory 000196009. 2. Upgrade to OneFS 9.3.0.1 or later. 3. Apply the patch following Dell's upgrade procedures. 4. Restart affected services or nodes as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SmartConnect interfaces to trusted networks only.

Configure firewall rules to limit access to SmartConnect ports (typically TCP 53, 445, 2049, 111) to authorized clients only.

Disable SmartConnect

linux

Temporarily disable SmartConnect if not required, though this may impact load balancing and failover capabilities.

isi network subnets modify --smartconnect-enabled=false <subnet_name>

🧯 If You Can't Patch

  • Implement strict network access controls to limit which clients can communicate with SmartConnect interfaces.
  • Monitor SmartConnect services for unusual activity or denial-of-service attempts and have incident response procedures ready.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version with 'isi version' command. If version is between 8.2.x and 9.3.0.x inclusive, and SmartConnect is enabled, the system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

Verify version is 9.3.0.1 or later with 'isi version' command and confirm SmartConnect functionality is operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SmartConnect service restarts or crashes in /var/log/messages
  • Increased error messages related to SmartConnect in system logs

Network Indicators:

  • Unusual traffic patterns to SmartConnect ports from unexpected sources
  • Spike in connection attempts to SmartConnect services

SIEM Query:

source="*messages*" AND "SmartConnect" AND ("crash" OR "error" OR "restart")

🔗 References

📤 Share & Export