Critical
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
CVE-2025-27690 |
Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account. |
9.8 |
|
CVE-2025-26330 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an incorrect authorization vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability to access the cluster with previous privileges of a disabled user account. |
7.0 |
|
CVE-2025-22471 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an integer overflow or wraparound vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service. |
6.5 |
|
CVE-2025-26480 |
Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.0, contains an uncontrolled resource consumption vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service. |
5.3 |
|
CVE-2025-23378 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an exposure of information through directory listing vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure. |
3.3 |
|
CVE-2025-26479 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an out-of-bounds write vulnerability. |
3.1 |
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
CVE-2025-27690 |
Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account. |
9.8 |
|
CVE-2025-26330 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an incorrect authorization vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability to access the cluster with previous privileges of a disabled user account. |
7.0 |
|
CVE-2025-22471 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an integer overflow or wraparound vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service. |
6.5 |
|
CVE-2025-26480 |
Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.0, contains an uncontrolled resource consumption vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service. |
5.3 |
|
CVE-2025-23378 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an exposure of information through directory listing vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure. |
3.3 |
|
CVE-2025-26479 |
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an out-of-bounds write vulnerability. |
3.1 |
CVEs Addressed |
Product |
Affected Versions |
Remediated Versions |
Link |
CVE-2025-23378 |
PowerScale OneFS |
Version 9.4.0.0 through 9.10.0.0 |
Version 9.10.1.1 or later |
|
CVE-2025-26479, CVE-2025-26330, CVE-2025-22471 |
PowerScale OneFS |
Version 9.4.0.0 through 9.10.0.1 |
Version 9.10.1.1 or later |
|
CVE-2025-26480 |
PowerScale OneFS |
Version 9.5.0.0 through 9.10.0.0 |
Version 9.10.1.1 or later |
|
CVE-2025-22471 |
PowerScale OneFS |
Version 9.4.0.0 through 9.4.0.20 |
Version 9.4.0.21 or later |
|
CVE-2025-22471, CVE-2025-26480, CVE-2025-26479, CVE-2025-23378 |
PowerScale OneFS |
Version 9.5.0.0 through 9.5.1.2 |
Version 9.5.1.3 or later |
|
CVE-2025-26330, CVE-2025-22471, CVE-2025-26480, CVE-2025-26479, CVE-2025-23378 |
PowerScale OneFS |
Version 9.7.0.0 through 9.7.1.4 |
Version 9.7.1.5 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.5.0.0 through 9.5.1.2 |
Version 9.5.1.3 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.6.0.0 through 9.7.1.6 |
Version 9.7.1.7 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.8.0.0 through 9.8.0.2 |
Version 9.8.0.3 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.9.0.0 through 9.9.0.1 |
Version 9.9.0.2 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.10.0.0 through 9.10.1.0 |
Version 9.10.1.1 or later |
CVEs Addressed |
Product |
Affected Versions |
Remediated Versions |
Link |
CVE-2025-23378 |
PowerScale OneFS |
Version 9.4.0.0 through 9.10.0.0 |
Version 9.10.1.1 or later |
|
CVE-2025-26479, CVE-2025-26330, CVE-2025-22471 |
PowerScale OneFS |
Version 9.4.0.0 through 9.10.0.1 |
Version 9.10.1.1 or later |
|
CVE-2025-26480 |
PowerScale OneFS |
Version 9.5.0.0 through 9.10.0.0 |
Version 9.10.1.1 or later |
|
CVE-2025-22471 |
PowerScale OneFS |
Version 9.4.0.0 through 9.4.0.20 |
Version 9.4.0.21 or later |
|
CVE-2025-22471, CVE-2025-26480, CVE-2025-26479, CVE-2025-23378 |
PowerScale OneFS |
Version 9.5.0.0 through 9.5.1.2 |
Version 9.5.1.3 or later |
|
CVE-2025-26330, CVE-2025-22471, CVE-2025-26480, CVE-2025-26479, CVE-2025-23378 |
PowerScale OneFS |
Version 9.7.0.0 through 9.7.1.4 |
Version 9.7.1.5 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.5.0.0 through 9.5.1.2 |
Version 9.5.1.3 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.6.0.0 through 9.7.1.6 |
Version 9.7.1.7 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.8.0.0 through 9.8.0.2 |
Version 9.8.0.3 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.9.0.0 through 9.9.0.1 |
Version 9.9.0.2 or later |
|
CVE-2025-27690 |
PowerScale OneFS |
Version 9.10.0.0 through 9.10.1.0 |
Version 9.10.1.1 or later |
We encourage all customers to adopt the Long-Term Support (LTS) 2025 version which is 9.10.1.x code line, with the latest maintenance release, currently MR 9.10.1.1. For more information on LTS code lines, see Dell Infrastructure Solutions Group (ISG) LTS Release Support Customer Summary
CVE ID |
Workaround and Mitigation |
CVE-2025-27690 |
These independent workarounds can be in place until an upgrade to a fixed release, or patch can be applied. Note: Authentication Provider hash types can be viewed with isi auth file view System in the "Password Hash Type" entry.
Workaround 1: Add the impacted users to the "Users who cannot be modified" list.
For clusters that have switched to SHA256 or SHA512 hash types:
Once the patch is applied, if you use the users, you can make them modifiable again.
Workaround 2: For clusters that have not switched to SHA256 or SHA512 hash types.
Workaround 3: Disable the WebUI and API via CLI
This does not completely mitigate the issue as it could still be abused by users with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH.
Workaround 4: Limit access to API & WebUI to trusted networks via firewall rule
This does not completely mitigate the issue as it could still be abused by users with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH, as well as users on the IPs allowed through the firewall. |
Revision |
Date |
Description |
1.0 |
2025-04-07 |
Initial Release |
2.0 |
2025-04-07 |
Minor update; Formatting changes only |
3.0 |
2025-04-09 |
Minor update; Removed a duplicate entry |