CVE-2023-25941

7.8 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 8.2.x through 9.5.0.x contain a local privilege escalation vulnerability. A low-privileged local attacker could exploit this to gain elevated privileges, potentially leading to denial of service, information disclosure, and privilege escalation. This vulnerability affects Dell PowerScale storage systems running vulnerable OneFS versions.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.x through 9.5.0.x
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running affected versions are vulnerable. The vulnerability breaks compliance mode guarantees.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains root-level access to the PowerScale cluster, compromising all data, disrupting operations, and potentially pivoting to other systems.

🟠

Likely Case

A malicious insider or compromised low-privileged account escalates privileges to access sensitive data or disrupt storage services.

🟢

If Mitigated

With strict access controls and monitoring, exploitation is detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access with low privileges. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.0.1 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000211539/dell-emc-powerscale-onefs-security

Restart Required: Yes

Instructions:

1. Review Dell advisory 000211539. 2. Apply OneFS update to version 9.5.0.1 or later. 3. Reboot the PowerScale cluster as required by the update process.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local shell access to only trusted administrators to reduce attack surface.

Review and tighten SSH/console access controls
Implement strict user account management

🧯 If You Can't Patch

  • Implement strict least-privilege access controls and monitor for suspicious local activity.
  • Segment PowerScale systems from general user networks and restrict access to administrative interfaces only.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web UI. If version is between 8.2.x and 9.5.0.x inclusive, system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

After patching, verify version is 9.5.0.1 or later using 'isi version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in system logs
  • Unexpected user account modifications
  • Failed compliance mode checks

Network Indicators:

  • Unusual administrative access patterns to PowerScale management interfaces

SIEM Query:

Search for events where low-privileged users gain root/admin access on PowerScale systems.

🔗 References

📤 Share & Export