DSA-2026-049: Security Update for Dell PowerScale OneFS Multiple Vulnerabilities

Summary: Dell PowerScale OneFS remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Acest articol se aplică pentru Acest articol nu se aplică pentru Acest articol nu este legat de un produs specific. Acest articol nu acoperă toate versiunile de produs existente.

Impact

High

Details

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2026-22278 Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22280 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains an incorrect permission assignment for critical resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service. 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22279 Dell PowerScale OneFS, versions prior 9.13.0.0, contains an insufficient logging vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information tampering. 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22281 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains a Time-of-check Time-of-use (TOCTOU) race condition vulnerability. A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to denial of service. 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LThis hyperlink is taking you to a website outside of Dell Technologies.

 

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2026-22278 Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22280 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains an incorrect permission assignment for critical resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service. 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22279 Dell PowerScale OneFS, versions prior 9.13.0.0, contains an insufficient logging vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information tampering. 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
CVE-2026-22281 Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains a Time-of-check Time-of-use (TOCTOU) race condition vulnerability. A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to denial of service. 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Produse afectate și măsuri de remediere

CVEs Addressed Product Affected Versions Remediated Versions Link
CVE-2026-22278, CVE-2026-22280, CVE-2026-22279, CVE-2026-22281 PowerScale OneFS Versions prior to 9.13.0.0 Version 9.13.0.0 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.5.0.0 through 9.5.1.5 Version 9.5.1.6 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.6.0.0 through 9.7.1.10 Version 9.7.1.11 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.8.0.0 through 9.10.1.3 Version 9.10.1.4 or later PowerScale OneFS Downloads Area

 

CVEs Addressed Product Affected Versions Remediated Versions Link
CVE-2026-22278, CVE-2026-22280, CVE-2026-22279, CVE-2026-22281 PowerScale OneFS Versions prior to 9.13.0.0 Version 9.13.0.0 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.5.0.0 through 9.5.1.5 Version 9.5.1.6 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.6.0.0 through 9.7.1.10 Version 9.7.1.11 or later PowerScale OneFS Downloads Area
CVE-2026-22280, CVE-2026-22281 PowerScale OneFS Versions 9.8.0.0 through 9.10.1.3 Version 9.10.1.4 or later PowerScale OneFS Downloads Area

 

Soluții alternative și strategii de atenuare

None

Revision History

RevisionDateDescription
1.02026-01-15Initial Release

 

Related Information

Produse afectate

PowerScale OneFS
Proprietăți articol
Article Number: 000415586
Article Type: Dell Security Advisory
Ultima modificare: 15 ian. 2026
Găsiți răspunsuri la întrebările dvs. de la alți utilizatori Dell
Servicii de asistență
Verificați dacă dispozitivul dvs. este acoperit de serviciile de asistență.