CVE-2022-26851

9.1 CRITICAL

📋 TL;DR

Dell PowerScale OneFS versions 8.2.2 through 9.3.x contain a predictable file name vulnerability that allows unprivileged network attackers to potentially cause data loss. The vulnerability stems from observable state information that can be used to predict file names, enabling attackers to manipulate or delete files. This affects all Dell PowerScale OneFS deployments running vulnerable versions.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.2 through 9.3.x
Operating Systems: OneFS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected versions are vulnerable. The vulnerability requires network access to the PowerScale system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete data loss or corruption of critical files through predictable file name manipulation by an unprivileged attacker.

🟠

Likely Case

Targeted data deletion or corruption of specific files accessible to the attacker through predictable naming patterns.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unprivileged network access to affected systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of the predictable naming pattern and network access to the system. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4.0.0 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the latest OneFS update from Dell Support. 2. Apply the update following Dell's upgrade procedures. 3. Reboot the PowerScale cluster to complete the update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to PowerScale systems to only trusted administrative networks.

Access Control Lists

all

Implement strict file and directory permissions to limit what unprivileged users can access.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerScale systems from untrusted networks.
  • Enable comprehensive logging and monitoring for file access patterns and implement alerting for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check the OneFS version using 'isi version' command. If version is between 8.2.2 and 9.3.x inclusive, the system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

After patching, verify the version is 9.4.0.0 or later using 'isi version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from unprivileged users
  • Multiple failed file access attempts followed by successful manipulation
  • File deletion or modification events from unexpected sources

Network Indicators:

  • Network traffic to PowerScale systems from unauthorized sources
  • Patterns of file access requests that follow predictable naming conventions

SIEM Query:

source="powerscale_logs" AND (event_type="file_access" OR event_type="file_modify") AND user="unprivileged" AND file_name MATCHES "predictable_pattern*"

🔗 References

📤 Share & Export