CVE-2022-31230

8.1 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 8.2.x through 9.2.x contain a broken or risky cryptographic algorithm vulnerability. A remote unprivileged attacker could exploit this to gain full system access. This affects Dell PowerScale storage systems running vulnerable OneFS versions.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.x through 9.2.x
Operating Systems: OneFS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected versions are vulnerable. PowerScale systems are typically deployed in enterprise storage environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full administrative control over the PowerScale cluster, allowing data theft, destruction, or ransomware deployment.

🟠

Likely Case

Attacker gains unauthorized access to sensitive data stored on the PowerScale system and potentially pivots to other network resources.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the PowerScale system itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability involves cryptographic weaknesses that could be exploited remotely without authentication. Specific exploit details are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OneFS 9.3.0.0 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000200681/dsa-2022-118-dell-emc-powerscale-onefs-security-update

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2022-118. 2. Upgrade to OneFS 9.3.0.0 or later. 3. Reboot the PowerScale cluster after upgrade.

🔧 Temporary Workarounds

Network segmentation

all

Restrict network access to PowerScale management interfaces to trusted networks only.

Access control lists

all

Implement strict firewall rules to limit which IP addresses can communicate with PowerScale systems.

🧯 If You Can't Patch

  • Isolate PowerScale systems in a dedicated VLAN with strict access controls.
  • Implement network monitoring and intrusion detection specifically for PowerScale traffic.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via SSH: 'isi version' or web interface. If version is between 8.2.x and 9.2.x inclusive, system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

Verify OneFS version is 9.3.0.0 or later using 'isi version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized authentication attempts to PowerScale management interfaces
  • Unusual cryptographic operations in system logs

Network Indicators:

  • Unexpected network traffic to PowerScale management ports (typically 8080, 9090)

SIEM Query:

source="powerscale" AND (event_type="auth_failure" OR protocol="crypto")

🔗 References

📤 Share & Export