CVE-2024-25967
📋 TL;DR
This CVE describes a privilege escalation vulnerability in Dell PowerScale OneFS where local high-privileged users can execute commands with unnecessary elevated privileges. The vulnerability affects OneFS versions 8.2.x through 9.7.0.1, allowing attackers already on the system to gain higher privileges than intended.
💻 Affected Systems
- Dell PowerScale OneFS
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
A local high-privileged attacker gains full root/system-level access to the PowerScale cluster, potentially compromising all data, disrupting operations, or establishing persistence.
Likely Case
Malicious insiders or compromised administrative accounts escalate privileges to access sensitive data or modify system configurations.
If Mitigated
With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.
🎯 Exploit Status
Exploitation requires existing local high-privileged access. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to OneFS version 9.7.0.2 or later as specified in DSA-2024-163
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
Restart Required: Yes
Instructions:
1. Review DSA-2024-163 advisory. 2. Download appropriate OneFS update from Dell Support. 3. Apply update following Dell's PowerScale update procedures. 4. Reboot the cluster as required.
🔧 Temporary Workarounds
Restrict local administrative access
allLimit the number of users with local high-privileged access to PowerScale systems
Implement strict access controls
allEnforce least privilege principles and monitor privileged account activity
🧯 If You Can't Patch
- Implement strict monitoring of privileged user activities and command execution
- Segment PowerScale systems and limit access to only essential administrative personnel
🔍 How to Verify
Check if Vulnerable:
Check OneFS version with 'isi version' command. If version is between 8.2.x and 9.7.0.1 inclusive, system is vulnerable.
Check Version:
isi version
Verify Fix Applied:
After patching, run 'isi version' to confirm version is 9.7.0.2 or later.
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation events
- Unexpected execution of high-privilege commands by local users
- Authentication logs showing suspicious privileged account activity
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
Search for 'privilege escalation' or 'sudo/su' anomalies in PowerScale audit logs