CVE-2022-31234

8.1 HIGH

📋 TL;DR

Dell EMC PowerStore Manager GUI has an authentication rate limiting vulnerability that allows unauthenticated remote attackers to perform password brute-force attacks. This affects all PowerStore systems with the vulnerable GUI exposed. Account takeover is possible if users have weak passwords.

💻 Affected Systems

Products:
  • Dell EMC PowerStore
Versions: All versions prior to PowerStoreOS 3.0.0.0
Operating Systems: PowerStoreOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the PowerStore Manager GUI component specifically. All deployments with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through administrator account takeover, leading to data theft, ransomware deployment, or system destruction.

🟠

Likely Case

Unauthorized access to user accounts with weak passwords, potentially leading to data exposure and lateral movement within the storage environment.

🟢

If Mitigated

Limited impact if strong passwords are enforced and network access controls restrict GUI exposure.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers to brute-force passwords from anywhere on the internet.
🏢 Internal Only: HIGH - Even internally, this allows attackers to brute-force credentials without authentication requirements.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple brute-force attack requiring only network access to the GUI. No special tools needed beyond standard password cracking utilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PowerStoreOS 3.0.0.0 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/000201283

Restart Required: Yes

Instructions:

1. Download PowerStoreOS 3.0.0.0 or later from Dell Support. 2. Apply the update through PowerStore Manager. 3. Reboot the system as required by the update process.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to PowerStore Manager GUI to trusted IP addresses only.

Configure firewall rules to allow only specific source IPs to access PowerStore Manager ports (typically 443/TCP)

Password Policy Enforcement

all

Enforce strong password policies and implement account lockout mechanisms.

Configure password complexity requirements and account lockout thresholds in PowerStore Manager settings

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerStore systems from untrusted networks
  • Enforce strong password policies with minimum 12-character complex passwords and regular rotation

🔍 How to Verify

Check if Vulnerable:

Check PowerStoreOS version in PowerStore Manager GUI under Settings > System > Software. If version is below 3.0.0.0, system is vulnerable.

Check Version:

Connect to PowerStore Manager GUI and navigate to Settings > System > Software to view version

Verify Fix Applied:

Confirm PowerStoreOS version is 3.0.0.0 or higher in the GUI. Test authentication attempts to verify rate limiting is now enforced.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from single IP addresses
  • Unusual authentication patterns outside business hours

Network Indicators:

  • High volume of HTTP/HTTPS requests to PowerStore Manager login endpoint
  • Traffic patterns suggesting automated password guessing

SIEM Query:

source="PowerStore" AND event_type="authentication_failure" AND count > 10 within 5 minutes

🔗 References

📤 Share & Export