CVE-2023-43087

4.3 MEDIUM

📋 TL;DR

Dell PowerScale OneFS versions 8.2.x through 9.5.0.x contain an improper permission handling vulnerability that allows low-privileged remote attackers to access information they shouldn't be able to see. This affects organizations using Dell PowerScale storage systems with these specific OneFS versions. The vulnerability enables unauthorized information disclosure through insufficient permission checks.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.x, 9.0.0.x through 9.5.0.x
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All PowerScale systems running affected OneFS versions are vulnerable by default. The vulnerability requires network access to the PowerScale management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive configuration data, system information, or potentially user data could be exposed to unauthorized low-privileged users, leading to data breach or reconnaissance for further attacks.

🟠

Likely Case

Low-privileged users gain access to system information, configuration details, or metadata they shouldn't see, potentially enabling further privilege escalation or information gathering.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to authorized users within the storage network, reducing exposure of sensitive data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged credentials but is likely straightforward once authenticated. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to OneFS 9.5.0.2 or later as specified in Dell advisory

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000218934/powerscale-onefs-security-updates-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory 000218934. 2. Download appropriate OneFS update from Dell support. 3. Apply update following Dell's PowerScale update procedures. 4. Reboot system as required by the update process.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to PowerScale management interfaces to only authorized administrative networks

Configure firewall rules to limit access to PowerScale management IPs/ports

Access Control Tightening

linux

Review and minimize low-privileged user accounts with access to PowerScale systems

Review user accounts via OneFS CLI: 'isi auth users list'
Remove unnecessary accounts: 'isi auth users delete <username>'

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerScale management interfaces from general user networks
  • Audit and reduce low-privileged user accounts with PowerScale access, implement principle of least privilege

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web UI. If version is between 8.2.x and 9.5.0.x (excluding 9.5.0.2+), system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

After patching, verify version is 9.5.0.2 or later using 'isi version' command. Test with low-privileged account to confirm information disclosure is prevented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns from low-privileged accounts to sensitive endpoints
  • Multiple failed permission checks followed by successful access

Network Indicators:

  • Increased traffic from non-admin networks to PowerScale management ports
  • Unusual data retrieval patterns from low-privileged IPs

SIEM Query:

source="powerscale" AND (event_type="access_denied" OR event_type="permission_failure") AND user_privilege="low" AND result="success"

🔗 References

📤 Share & Export