DSA-2026-049: Security Update for Dell PowerScale OneFS Multiple Vulnerabilities

Oversigt: Dell PowerScale OneFS remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Denne artikel gælder for Denne artikel gælder ikke for Denne artikel er ikke knyttet til et bestemt produkt. Det er ikke alle produktversioner, der er identificeret i denne artikel.

Virkning

High

Oplysninger

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2026-22278 Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22280 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains an incorrect permission assignment for critical resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service. 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22279 Dell PowerScale OneFS, versions prior 9.13.0.0, contains an insufficient logging vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information tampering. 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22281 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains a Time-of-check Time-of-use (TOCTOU) race condition vulnerability. A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to denial of service. 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LThis hyperlink is taking you to a website outside of Dell Technologies.

 

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2026-22278 Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22280 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains an incorrect permission assignment for critical resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service. 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22279 Dell PowerScale OneFS, versions prior 9.13.0.0, contains an insufficient logging vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information tampering. 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22281 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains a Time-of-check Time-of-use (TOCTOU) race condition vulnerability. A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to denial of service. 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies anbefaler, at alle kunder tager hensyn til både CVSS-basisresultatet og alle relevante tidsmæssige og miljømæssige resultater, som kan have betydning for den potentielle alvorsgrad, der er forbundet med en bestemt sikkerhedsrisiko.

Berørte produkter og udbedring

CVEs Addressed Product Affected Versions Remediated Versions Link
CVE-2026-22278, CVE-2026-22280, CVE-2026-22279, CVE-2026-22281 PowerScale OneFS Versions prior to 9.13.0.0 Version 9.13.0.0 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.5.0.0 through 9.5.1.5 Version 9.5.1.6 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.6.0.0 through 9.7.1.10 Version 9.7.1.11 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.8.0.0 through 9.10.1.3 Version 9.10.1.4 or later PowerScale OneFS Downloads Area

 

CVEs Addressed Product Affected Versions Remediated Versions Link
CVE-2026-22278, CVE-2026-22280, CVE-2026-22279, CVE-2026-22281 PowerScale OneFS Versions prior to 9.13.0.0 Version 9.13.0.0 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.5.0.0 through 9.5.1.5 Version 9.5.1.6 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.6.0.0 through 9.7.1.10 Version 9.7.1.11 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.8.0.0 through 9.10.1.3 Version 9.10.1.4 or later PowerScale OneFS Downloads Area

 

Løsninger og afhjælpninger

None

Revisionshistorik

RevisionDateDescription
1.02026-01-15Initial Release

 

Relaterede oplysninger

Berørte produkter

PowerScale OneFS
Artikelegenskaber
Artikelnummer: 000415586
Artikeltype: Dell Security Advisory
Senest ændret: 15 jan. 2026
Find svar på dine spørgsmål fra andre Dell-brugere
Supportservices
Kontrollér, om din enhed er dækket af supportservices.