CVE-2022-24412

7.5 HIGH

📋 TL;DR

CVE-2022-24412 is an improper handling of value vulnerability in Dell EMC PowerScale OneFS, allowing an unprivileged network attacker to cause a denial-of-service. It affects PowerScale OneFS versions 8.2.x through 9.3.0.x, potentially disrupting storage operations for organizations using these systems.

💻 Affected Systems

Products:
  • Dell EMC PowerScale OneFS
Versions: 8.2.x - 9.3.0.x
Operating Systems: PowerScale OneFS (based on FreeBSD)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable; no specific settings are required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Exploitation could lead to a complete denial-of-service, rendering the PowerScale OneFS system unavailable and disrupting storage services, impacting business operations.

🟠

Likely Case

Most probable impact is a partial or temporary denial-of-service, causing performance degradation or service interruptions for network-accessible storage functions.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is minimized, limiting exposure to authorized internal users and reducing the risk of exploitation.

🌐 Internet-Facing: HIGH, as the vulnerability is network-based and can be exploited by unprivileged attackers, making internet-facing systems particularly vulnerable to denial-of-service attacks.
🏢 Internal Only: MEDIUM, as internal attackers could still exploit it, but network segmentation and monitoring can help mitigate the risk compared to internet exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward due to the unauthenticated nature and network accessibility, but no public proof-of-concept has been disclosed as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OneFS 9.3.0.1 and later versions

Vendor Advisory: https://www.dell.com/support/kbdoc/000196657

Restart Required: Yes

Instructions:

1. Review the Dell advisory at the provided URL. 2. Upgrade PowerScale OneFS to version 9.3.0.1 or later. 3. Apply the patch through the OneFS management interface or CLI. 4. Restart the system as required to complete the update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to PowerScale OneFS systems to trusted internal networks only, reducing exposure to potential attackers.

Access Control Lists (ACLs)

all

Implement strict ACLs to limit which IP addresses or subnets can communicate with the PowerScale OneFS management and data interfaces.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerScale OneFS systems from untrusted networks.
  • Monitor network traffic and logs for unusual activity or denial-of-service attempts, and have an incident response plan ready.

🔍 How to Verify

Check if Vulnerable:

Check the PowerScale OneFS version via the management interface or CLI; if it is between 8.2.x and 9.3.0.x, it is vulnerable.

Check Version:

isi version (run on the PowerScale OneFS CLI)

Verify Fix Applied:

After patching, verify the version is 9.3.0.1 or later using the same method, and test system functionality to ensure no denial-of-service occurs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connection attempts to PowerScale OneFS ports
  • Log entries indicating service disruptions or crashes in system logs

Network Indicators:

  • Spike in network traffic to PowerScale OneFS systems from unauthenticated sources
  • Anomalous patterns in storage protocol communications

SIEM Query:

Example: source="PowerScale_OneFS" AND (event_type="denial_of_service" OR error_code="CVE-2022-24412")

🔗 References

📤 Share & Export