CVE-2024-49603

4.3 MEDIUM

📋 TL;DR

Dell PowerScale OneFS versions 8.2.2.x through 9.9.0.x contain an incorrect argument specification vulnerability that allows remote low-privileged legitimate users to potentially exploit it for information disclosure. This affects organizations using Dell PowerScale storage systems with these OneFS versions.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.2.x through 9.9.0.x
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires legitimate user credentials with low privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive system information or configuration data could be exposed to unauthorized users, potentially aiding further attacks.

🟠

Likely Case

Limited information disclosure about system configuration or state to authenticated low-privilege users.

🟢

If Mitigated

No impact if proper access controls and network segmentation are in place.

🌐 Internet-Facing: MEDIUM - If management interfaces are exposed to the internet, risk increases significantly.
🏢 Internal Only: LOW - Risk is limited to authenticated users within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and specific knowledge of the vulnerable argument.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates per Dell advisory DSA-2024-453

Vendor Advisory: https://www.dell.com/support/kbdoc/en-in/000256645/dsa-2024-453-security-update-for-dell-powerscale-onefs-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-453. 2. Download appropriate OneFS update. 3. Apply update following Dell PowerScale update procedures. 4. Reboot system as required.

🔧 Temporary Workarounds

Restrict Access

all

Limit access to PowerScale management interfaces to only authorized administrators.

Network Segmentation

all

Isolate PowerScale systems from general user networks.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access PowerScale interfaces.
  • Monitor authentication logs for unusual access patterns to PowerScale systems.

🔍 How to Verify

Check if Vulnerable:

Check OneFS version with 'isi version' command and compare to affected versions 8.2.2.x through 9.9.0.x.

Check Version:

isi version

Verify Fix Applied:

Verify OneFS version after update shows a version above 9.9.0.x or patched version per Dell advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns to PowerScale interfaces
  • Multiple failed argument/parameter attempts in system logs

Network Indicators:

  • Unusual traffic to PowerScale management ports from non-admin sources

SIEM Query:

source="powerscale*" AND (event_type="authentication" OR event_type="parameter_error")

🔗 References

📤 Share & Export