CVE-2024-47239

6.5 MEDIUM

📋 TL;DR

Dell PowerScale OneFS versions 8.2.2.x through 9.9.0.0 contain an uncontrolled resource consumption vulnerability that allows remote low-privileged attackers to cause denial of service. This affects Dell PowerScale storage systems running vulnerable OneFS versions. Attackers can exhaust system resources without authentication, disrupting storage services.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.2.x through 9.9.0.0
Operating Systems: OneFS
Default Config Vulnerable: ⚠️ Yes
Notes: All PowerScale systems running affected OneFS versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability causing storage service disruption, data inaccessibility, and potential business continuity impact.

🟠

Likely Case

Degraded performance or temporary service interruption affecting storage operations until system resources recover.

🟢

If Mitigated

Minimal impact with proper network segmentation, rate limiting, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Low-privileged remote access required, but exploit complexity appears low based on vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.9.0.1 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000269590/dsa-2024-480-security-update-for-dell-powerscale-onefs-security-vulnerability

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-480. 2. Download appropriate OneFS update. 3. Apply update following Dell PowerScale update procedures. 4. Reboot system as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to PowerScale management interfaces to trusted networks only.

Rate Limiting

all

Implement network rate limiting on PowerScale interfaces to prevent resource exhaustion attacks.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only.
  • Deploy monitoring for unusual resource consumption patterns and implement automated alerting.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web interface. If version is between 8.2.2.x and 9.9.0.0 inclusive, system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

Verify OneFS version is 9.9.0.1 or later using 'isi version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual resource consumption patterns
  • Multiple failed connection attempts
  • System performance degradation alerts

Network Indicators:

  • High volume of requests to PowerScale interfaces
  • Unusual traffic patterns from untrusted sources

SIEM Query:

source="powerscale" AND (event_type="resource_exhaustion" OR event_type="performance_degradation")

🔗 References

📤 Share & Export