CVE-2024-42426

4.3 MEDIUM

📋 TL;DR

Dell PowerScale OneFS versions 9.5.0.x through 9.8.0.x contain an uncontrolled resource consumption vulnerability. A low-privilege remote attacker could exploit this to cause denial of service by exhausting system resources. Organizations running affected Dell PowerScale OneFS storage systems are impacted.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 9.5.0.x through 9.8.0.x
Operating Systems: OneFS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to resource exhaustion, disrupting all storage services and potentially affecting dependent applications.

🟠

Likely Case

Degraded performance or temporary service interruptions affecting specific storage operations.

🟢

If Mitigated

Minimal impact with proper network segmentation and resource monitoring in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privilege remote access. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions beyond 9.8.0.x (check Dell advisory for specific patched versions)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-in/000256645/dsa-2024-453-security-update-for-dell-powerscale-onefs-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-453. 2. Download appropriate OneFS update from Dell support. 3. Apply update following Dell's documented upgrade procedures. 4. Reboot system as required.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to PowerScale management interfaces to trusted networks only.

Configure firewall rules to limit access to PowerScale management IPs/ports

Resource Monitoring

all

Implement enhanced monitoring for resource consumption on PowerScale nodes.

Set up alerts for unusual CPU/memory/disk usage patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerScale systems from untrusted networks.
  • Enforce least privilege access controls and monitor for unusual authentication patterns.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web interface System Health > Software.

Check Version:

isi version

Verify Fix Applied:

Verify version is updated beyond affected range and monitor for resource consumption anomalies.

📡 Detection & Monitoring

Log Indicators:

  • Unusual resource consumption patterns
  • Multiple failed authentication attempts from single source
  • System performance degradation alerts

Network Indicators:

  • Unusual traffic patterns to PowerScale management interfaces
  • Multiple connections from single IP to vulnerable services

SIEM Query:

source="powerscale" AND (event_type="resource_exhaustion" OR cpu_usage>90 OR memory_usage>90)

🔗 References

📤 Share & Export