CVE-2022-26854

8.1 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 8.2.x through 9.2.x contain weak cryptographic algorithms that could allow a remote attacker without privileges to gain full system access. This affects Dell PowerScale storage systems running vulnerable OneFS versions. Attackers could potentially exploit this to compromise the entire storage system.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.x through 9.2.x
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All PowerScale systems running affected OneFS versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full administrative control over the PowerScale cluster, allowing data theft, destruction, or ransomware deployment across all managed storage.

🟠

Likely Case

Attackers exploit weak cryptography to escalate privileges and gain administrative access to the storage system, potentially compromising sensitive data.

🟢

If Mitigated

With proper network segmentation and access controls, exploitation would require internal network access, limiting external attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of cryptographic weaknesses in OneFS implementation. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OneFS 9.3.0.0 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities

Restart Required: Yes

Instructions:

1. Download OneFS 9.3.0.0 or later from Dell Support. 2. Follow Dell's upgrade procedures for PowerScale clusters. 3. Apply the update to all nodes in the cluster. 4. Reboot the cluster as required by the upgrade process.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to PowerScale management interfaces to trusted internal networks only.

Access Control Lists

all

Implement strict network ACLs to limit which IPs can communicate with PowerScale management ports.

🧯 If You Can't Patch

  • Isolate PowerScale systems from internet and untrusted networks
  • Implement strict network monitoring for unusual authentication attempts to PowerScale systems

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via PowerScale web interface or SSH: 'isi version' command

Check Version:

isi version

Verify Fix Applied:

Verify version is 9.3.0.0 or higher using 'isi version' command

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Failed login attempts followed by successful privileged access
  • Cryptographic algorithm negotiation logs showing weak ciphers

Network Indicators:

  • Unusual traffic to PowerScale management ports (typically 8080, 22)
  • Traffic patterns suggesting cryptographic negotiation

SIEM Query:

source="powerscale" AND (event_type="authentication" AND result="success" AND user="root") OR (protocol="ssh" AND cipher="weak_cipher_name")

🔗 References

📤 Share & Export