CVE-2025-26480

5.3 MEDIUM

📋 TL;DR

Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.0 contain an uncontrolled resource consumption vulnerability. An unauthenticated remote attacker could exploit this to cause denial of service by exhausting system resources. Organizations running affected Dell PowerScale storage systems are impacted.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 9.5.0.0 through 9.10.0.0
Operating Systems: OneFS (Dell's proprietary storage OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations within affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to resource exhaustion, disrupting all storage services and potentially affecting dependent applications.

🟠

Likely Case

Degraded performance or temporary service interruption affecting storage operations until resources recover or system restarts.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring that detects and blocks exploitation attempts early.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing systems particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this, but network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests straightforward exploitation requiring only remote access, though specific exploit details aren't public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 9.10.0.0 (check Dell advisory for specific fixed versions)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-119. 2. Apply the recommended OneFS update. 3. Restart affected systems as required. 4. Verify update completion.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to PowerScale management interfaces to trusted IPs only

Configure firewall rules to limit access to PowerScale management ports

Rate Limiting

all

Implement network rate limiting to prevent resource exhaustion attacks

Configure network devices to limit connections to PowerScale systems

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to PowerScale systems
  • Deploy intrusion detection/prevention systems to monitor for DoS attack patterns

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web interface. Compare against affected range 9.5.0.0-9.10.0.0.

Check Version:

isi version

Verify Fix Applied:

Verify version is updated beyond 9.10.0.0 using 'isi version' command and check for patch application in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual resource consumption spikes
  • Multiple connection attempts from single sources
  • System performance degradation alerts

Network Indicators:

  • High volume of requests to PowerScale management ports
  • Traffic patterns suggesting resource exhaustion attempts

SIEM Query:

source="powerscale" AND (resource_utilization>90 OR connection_rate>threshold)

🔗 References

📤 Share & Export