CVE-2026-21421

6.7 MEDIUM

📋 TL;DR

Dell PowerScale OneFS contains a privilege escalation vulnerability where high-privileged local attackers can execute code with unnecessary privileges. This affects Dell PowerScale OneFS versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1. Attackers with existing local access can exploit this to gain elevated privileges on the system.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: Versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1
Operating Systems: OneFS (Dell's proprietary operating system for PowerScale)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with local user access. Requires attacker to already have high-privileged local access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker with local access gains root/administrator privileges, potentially leading to data theft, system manipulation, or persistence mechanisms.

🟠

Likely Case

Privilege escalation from a high-privileged user to root/administrator, allowing unauthorized access to sensitive data and system configuration.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and least privilege principles are implemented to restrict local access.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: HIGH - Internal attackers with local access can exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access with high privileges. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.10.1.6 or later for 9.10.x branch, 9.12.0.2 or later for 9.11.x/9.12.x branches

Vendor Advisory: https://www.dell.com/support/kbdoc/en-sg/000432452/dsa-2026-038-security-update-for-dell-powerscale-onefs-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Dell Support. 2. Apply the patch following Dell's update procedures. 3. Reboot the system as required. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to PowerScale systems to only authorized administrators

Implement strict access controls and authentication mechanisms

Network Segmentation

all

Isolate PowerScale systems from general network access

Configure firewall rules to restrict access to PowerScale management interfaces

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local access to PowerScale systems
  • Monitor for suspicious privilege escalation attempts and review access logs regularly

🔍 How to Verify

Check if Vulnerable:

Check the OneFS version using the CLI command: 'isi version'

Check Version:

isi version

Verify Fix Applied:

Verify the version is 9.10.1.6 or higher for 9.10.x, or 9.12.0.2 or higher for 9.11.x/9.12.x

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Suspicious local user activity
  • Unexpected process execution with elevated privileges

Network Indicators:

  • N/A - Local exploitation only

SIEM Query:

Search for privilege escalation events or unexpected user privilege changes in system logs

🔗 References

📤 Share & Export