CVE-2025-43723

5.9 MEDIUM

📋 TL;DR

Dell PowerScale OneFS contains a broken cryptographic algorithm vulnerability that allows unauthenticated remote attackers to potentially access sensitive information. This affects OneFS versions prior to 9.10.1.3 and versions 9.11.0.0 through 9.12.0.0. Organizations using vulnerable versions are at risk of data exposure.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: Versions prior to 9.10.1.3 and versions 9.11.0.0 through 9.12.0.0
Operating Systems: OneFS (Dell's proprietary operating system for PowerScale)
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using affected versions are vulnerable. The vulnerability exists in the cryptographic implementation itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of encrypted data, allowing attackers to decrypt sensitive information stored or transmitted by the system.

🟠

Likely Case

Partial information disclosure where attackers can recover some encrypted data, potentially exposing sensitive configuration or user information.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, but cryptographic weaknesses remain exploitable if systems are reachable.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires cryptographic analysis and understanding of the specific broken algorithm implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.10.1.3 or later for 9.10.x branch, 9.12.0.1 or later for 9.11.x/9.12.x branches

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000390206/dsa-2025-381-security-update-for-dell-powerscale-onefs-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Dell Support. 2. Apply the patch following Dell's upgrade procedures. 3. Reboot the PowerScale cluster to complete the update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to PowerScale management interfaces to trusted networks only

Configure firewall rules to limit access to PowerScale nodes

Access Control

all

Implement strict network access controls to prevent unauthorized access to vulnerable systems

Use network ACLs to restrict traffic to PowerScale clusters

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerScale clusters from untrusted networks
  • Monitor for unusual access patterns or cryptographic-related errors in system logs

🔍 How to Verify

Check if Vulnerable:

Check the OneFS version using the CLI command: 'isi version' or through the web administration interface

Check Version:

isi version

Verify Fix Applied:

Verify the version is 9.10.1.3 or higher for 9.10.x, or 9.12.0.1 or higher for 9.11.x/9.12.x branches

📡 Detection & Monitoring

Log Indicators:

  • Unusual cryptographic errors
  • Failed authentication attempts from unexpected sources
  • Unexpected network connections to PowerScale services

Network Indicators:

  • Unusual traffic patterns to PowerScale management ports
  • Multiple failed connection attempts from single sources

SIEM Query:

source="powerscale*" AND (event_type="auth_failure" OR event_type="crypto_error")

🔗 References

📤 Share & Export