CVE-2022-45101

7.3 HIGH

📋 TL;DR

CVE-2022-45101 is an improper privilege handling vulnerability in Dell PowerScale OneFS NFS implementation. Remote unauthenticated attackers can exploit this to gain unauthorized access, potentially leading to information disclosure and remote code execution. This affects Dell PowerScale OneFS versions 9.0.0.x through 9.4.0.x.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 9.0.0.x - 9.4.0.x
Operating Systems: OneFS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with NFS enabled. The vulnerability is in the NFS implementation itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full system compromise, executes arbitrary code, and exfiltrates sensitive data from the PowerScale cluster.

🟠

Likely Case

Unauthorized access to NFS shares, information disclosure of sensitive files, and potential privilege escalation within the OneFS environment.

🟢

If Mitigated

Limited impact with proper network segmentation, NFS access controls, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to NFS services. No public exploit code has been observed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OneFS 9.4.0.5 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000206357/dell-emc-powerscale-onefs-security-updates-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate OneFS patch from Dell Support. 2. Apply the patch following Dell's upgrade procedures. 3. Reboot the PowerScale cluster as required by the update process.

🔧 Temporary Workarounds

Disable NFS if not required

linux

Temporarily disable NFS services to eliminate the attack vector

isi nfs disable

Restrict NFS access

linux

Use firewall rules to limit NFS access to trusted networks only

isi network firewall rules add --action=allow --protocol=tcp --port=2049 --source=TRUSTED_NETWORK

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerScale clusters from untrusted networks
  • Enable detailed logging and monitoring of NFS access attempts and implement alerting for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check OneFS version with 'isi version' command. If version is between 9.0.0.0 and 9.4.0.4 inclusive, the system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

Verify OneFS version is 9.4.0.5 or later using 'isi version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual NFS access patterns from unexpected sources
  • Failed authentication attempts followed by successful NFS operations
  • Unexpected process execution from NFS-related services

Network Indicators:

  • Unusual traffic to NFS port 2049 from external sources
  • Multiple connection attempts to NFS from single IP addresses

SIEM Query:

source="powerscale_logs" AND (event_type="nfs_access" AND src_ip NOT IN [trusted_networks]) OR (process_execution AND parent_process="nfsd")

🔗 References

📤 Share & Export