CVE-2024-25959

7.9 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 9.4.0.x through 9.7.0.x log sensitive information that could be accessed by local low-privileged users. This vulnerability allows attackers to read confidential data from log files, potentially leading to privilege escalation. Only local attackers with some system access can exploit this vulnerability.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 9.4.0.x through 9.7.0.x
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative privileges on the system by extracting credentials or sensitive tokens from logs, leading to complete system compromise and data exfiltration.

🟠

Likely Case

A low-privileged user reads sensitive configuration data, API keys, or partial credentials from logs, enabling lateral movement or limited privilege escalation.

🟢

If Mitigated

With proper log file permissions and monitoring, attackers cannot access sensitive logs, limiting impact to information disclosure without privilege escalation.

🌐 Internet-Facing: LOW - This requires local access to the system; internet-facing interfaces are not directly vulnerable.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but requires existing system access and log file access permissions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires reading log files that contain sensitive information. No authentication bypass needed beyond local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates per Dell advisory DSA-2024-115

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-115. 2. Download appropriate OneFS update for your version. 3. Apply update following Dell's upgrade procedures. 4. Restart affected systems as required.

🔧 Temporary Workarounds

Restrict log file permissions

linux

Change permissions on log files to prevent low-privileged users from reading sensitive logs.

chmod 640 /var/log/*.log
chown root:wheel /var/log/*.log

Monitor log access

linux

Implement auditing to detect unauthorized access to sensitive log files.

auditctl -w /var/log/ -p r -k sensitive_log_access

🧯 If You Can't Patch

  • Implement strict access controls on log directories to prevent low-privileged users from reading sensitive files.
  • Regularly audit and sanitize log files to remove sensitive information before retention.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version with 'isi version' command. If version is between 9.4.0.x and 9.7.0.x, system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

Verify version is updated beyond 9.7.0.x with 'isi version' and check that sensitive information no longer appears in log files.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to log files
  • Sensitive data patterns appearing in log entries accessible to low-privileged users

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="/var/log/*" AND (event_type="file_read" OR action="read") AND user!="root" AND file_path CONTAINS ".log"

🔗 References

📤 Share & Export