CVE-2025-30101

4.4 MEDIUM

📋 TL;DR

A TOCTOU race condition vulnerability in Dell PowerScale OneFS allows unauthenticated attackers with local access to cause denial of service or tamper with information. This affects Dell PowerScale OneFS versions 9.8.0.0 through 9.10.1.0. Organizations using these versions in their storage infrastructure are at risk.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 9.8.0.0 through 9.10.1.0
Operating Systems: OneFS (Dell's proprietary storage OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running affected versions are vulnerable. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash leading to extended downtime of storage services, potential data corruption or unauthorized modification of stored information.

🟠

Likely Case

Local denial of service affecting specific storage operations, potentially disrupting dependent applications and services.

🟢

If Mitigated

Minimal impact if proper network segmentation and access controls prevent local attacker access to vulnerable systems.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts with local access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires precise timing (race condition) and local system access. No authentication needed once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 9.10.1.0 (check Dell advisory for specific fixed version)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000317419/dsa-2025-192-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2025-192. 2. Download appropriate OneFS update from Dell support portal. 3. Apply update following Dell's OneFS upgrade procedures. 4. Reboot system as required by update process.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local system access to trusted administrators only through strict access controls and monitoring.

Network Segmentation

all

Isolate PowerScale systems on separate network segments with strict firewall rules preventing unauthorized access.

🧯 If You Can't Patch

  • Implement strict access controls to limit local access to only essential administrative personnel
  • Monitor system logs for unusual local access patterns or denial of service attempts

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web interface. If version is between 9.8.0.0 and 9.10.1.0 inclusive, system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

After patching, verify version is above 9.10.1.0 using 'isi version' command.

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid file access attempts from single source
  • System crash or restart logs without clear cause
  • Unusual process timing patterns in system logs

Network Indicators:

  • Unusual local network traffic patterns to storage systems
  • Multiple failed local authentication attempts followed by system issues

SIEM Query:

source="powerscale_logs" AND (event_type="system_crash" OR event_type="unusual_file_access")

🔗 References

📤 Share & Export