CVE-2026-21425

6.7 MEDIUM

📋 TL;DR

Dell PowerScale OneFS contains an incorrect privilege assignment vulnerability that allows local low-privileged attackers to elevate their privileges. This affects versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1. Organizations using vulnerable versions of Dell PowerScale OneFS storage systems are at risk.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: Versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1
Operating Systems: OneFS (PowerScale's proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability exists in the core OneFS operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with initial low-privileged access could gain full administrative control over the PowerScale OneFS system, potentially compromising all stored data and system functionality.

🟠

Likely Case

Malicious insiders or attackers who have gained initial foothold could escalate privileges to access sensitive data, modify configurations, or disrupt storage operations.

🟢

If Mitigated

With proper network segmentation, strict access controls, and monitoring, impact is limited to isolated storage segments with minimal data exposure.

🌐 Internet-Facing: LOW - This requires local access to the system, making internet-facing exploitation unlikely unless the system is directly exposed with user access.
🏢 Internal Only: HIGH - This is primarily an internal threat where attackers with initial access (malicious insiders, compromised accounts) can escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - The vulnerability description suggests straightforward privilege escalation once local access is obtained.

Exploitation requires local access with some level of initial privileges. No public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to OneFS 9.10.1.6 or later, or 9.12.0.2 or later for affected 9.11.x/9.12.x versions

Vendor Advisory: https://www.dell.com/support/kbdoc/en-sg/000432452/dsa-2026-038-security-update-for-dell-powerscale-onefs-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2026-038. 2. Backup system configurations and data. 3. Apply the appropriate OneFS update via the PowerScale web interface or CLI. 4. Reboot the system as required. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local system access to only authorized administrators through strict access controls and network segmentation.

Implement Least Privilege

all

Ensure all user accounts operate with minimum necessary privileges to reduce impact if credentials are compromised.

🧯 If You Can't Patch

  • Isolate PowerScale systems from general network access using strict firewall rules and network segmentation.
  • Implement enhanced monitoring and logging for privilege escalation attempts and unusual administrative activities.

🔍 How to Verify

Check if Vulnerable:

Check the OneFS version via the web interface or CLI command 'isi version'. Compare against affected versions: <9.10.1.6 or 9.11.0.0-9.12.0.1.

Check Version:

isi version

Verify Fix Applied:

After patching, verify the version is 9.10.1.6 or higher, or 9.12.0.2 or higher for 9.11.x/9.12.x systems.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Multiple failed privilege change attempts followed by success
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unexpected administrative access patterns to PowerScale management interfaces

SIEM Query:

source="powerscale" AND (event_type="privilege_escalation" OR user_change="admin")

🔗 References

📤 Share & Export