CVE-2024-25954

5.3 MEDIUM

📋 TL;DR

Dell PowerScale OneFS versions 9.5.0.x through 9.7.0.x have an insufficient session expiration vulnerability that allows remote unauthenticated attackers to cause denial of service. This affects all systems running these versions of Dell's scale-out NAS storage software.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 9.5.0.x through 9.7.0.x
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations within affected version range are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability through sustained DoS attacks, disrupting storage services for all connected clients and applications.

🟠

Likely Case

Service degradation or intermittent outages affecting storage performance and availability.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting in place.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing systems particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers could still cause service disruption, but network controls may limit impact.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote unauthenticated access lowers barrier to exploitation, though specific exploit details are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions beyond 9.7.0.x (check Dell advisory for specific patched versions)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-115. 2. Download appropriate OneFS update from Dell support. 3. Apply update following Dell's upgrade procedures. 4. Reboot system as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to PowerScale management interfaces to trusted networks only.

# Configure firewall rules to limit access to PowerScale management ports
# Example: iptables -A INPUT -p tcp --dport <management_port> -s <trusted_network> -j ACCEPT

Rate Limiting

all

Implement rate limiting on network traffic to PowerScale systems to mitigate DoS attempts.

# Use network appliances or firewall rate limiting rules
# Example rate limiting configuration depends on network equipment

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to untrusted networks
  • Monitor system performance and logs for signs of DoS activity and have incident response procedures ready

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web UI under Cluster Management > General Setup

Check Version:

isi version

Verify Fix Applied:

Verify version is updated beyond 9.7.0.x using 'isi version' command and check Dell advisory for specific patched versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual session activity patterns
  • Multiple failed authentication attempts from single sources
  • System performance degradation logs

Network Indicators:

  • Abnormal traffic spikes to PowerScale management ports
  • Repeated connection attempts from untrusted sources

SIEM Query:

source="powerscale" AND (event_type="session_anomaly" OR error_rate > threshold)

🔗 References

📤 Share & Export