CVE-2024-25960

7.3 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x transmit sensitive information in cleartext, allowing a local low-privileged attacker to intercept this data and potentially escalate privileges. This affects Dell PowerScale storage systems running vulnerable OneFS versions.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.2.x through 9.7.0.x
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local low-privileged access to the PowerScale system. The vulnerability involves cleartext transmission of sensitive information within the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains administrative privileges on the PowerScale cluster, enabling complete system compromise, data theft, or destruction.

🟠

Likely Case

Local attacker elevates privileges to access restricted data or perform unauthorized administrative actions within the OneFS environment.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the local system where the attacker already has low-privileged access.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to intercept cleartext transmissions. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to OneFS version 9.7.0.1 or later as specified in DSA-2024-115

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review DSA-2024-115 advisory. 2. Download appropriate OneFS update from Dell Support. 3. Apply update following Dell's PowerScale update procedures. 4. Reboot system as required.

🔧 Temporary Workarounds

Restrict Local Access

linux

Limit local console and SSH access to PowerScale systems to authorized administrators only.

# Configure access controls in OneFS: isi auth users modify <username> --enabled false
# Review and restrict SSH access in /etc/ssh/sshd_config

Network Segmentation

all

Isolate PowerScale management interfaces from general user networks to reduce attack surface.

# Configure firewall rules to restrict access to PowerScale management IPs

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local access to PowerScale systems.
  • Monitor system logs for unusual local authentication or privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version: ssh admin@powerscale 'isi version' and verify if version is between 8.2.2.x and 9.7.0.x

Check Version:

ssh admin@powerscale 'isi version'

Verify Fix Applied:

After update, run: ssh admin@powerscale 'isi version' and confirm version is 9.7.0.1 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual local authentication events
  • Privilege escalation attempts in system logs
  • Cleartext sensitive data transmission in network captures

Network Indicators:

  • Cleartext transmission of authentication or sensitive data on local interfaces

SIEM Query:

source="powerscale" AND (event_type="authentication" OR event_type="privilege") AND result="failure"

🔗 References

📤 Share & Export