Critical Dell PowerScale Vulnerabilities Allow Account Takeover

Home/Internet Security, Security Advisory, Security Update, Tips, vulnerability/Critical Dell PowerScale Vulnerabilities Allow Account Takeover

Critical Dell PowerScale Vulnerabilities Allow Account Takeover

Dell Technologies has released a critical alert about serious flaws in PowerScale OneFS that could let attackers gain control of high-level user accounts. The most dangerous bug, rated 9.8 on the CVSS scale, allows remote attackers to take over systems without needing to log in.

CVE-2025-27690

The most serious issue, CVE-2025-27690, affects PowerScale OneFS versions 9.5.0.0 to 9.10.1.0. It involves a default password that can let remote attackers take over high-privileged accounts without needing to log in.

Dell warns that attackers with remote access could exploit this flaw to fully control a high-level account.

This vulnerability has the highest severity rating (CVSS 9.8) and requires no user action or special access to exploit.

More Security Flaws Found in Dell PowerScale OneFS

Several new vulnerabilities have been found in Dell PowerScale OneFS, adding to the risks for enterprise users:

  • CVE-2025-26330 affects versions 9.4.0.0 to 9.10.0.1 and allows local attackers to access systems using the old privileges of disabled accounts. It has a CVSS score of 7.0, marking it as a serious threat.
  • CVE-2025-22471 is an integer overflow bug in the same versions that could cause a denial of service (DoS).
  • CVE-2025-26480 involves uncontrolled resource usage, which also makes systems vulnerable to DoS attacks.

These vulnerabilities create multiple entry points for attackers. The most critical, CVE-2025-27690, allows remote attackers to:

  1. Target the exposed PowerScale OneFS management interface
  2. Bypass login using a default password
  3. Gain full control over the system

Experts warn that running unpatched versions of PowerScale OneFS can put your data and storage infrastructure at serious risk.

How to Stay Protected

Dell strongly advises all users to upgrade to a fixed version. To fix most issues, including the critical CVE-2025-27690, update to version 9.10.1.1 or newer.

If you can’t update right away, Dell suggests a temporary workaround:

  • Add affected users to the “Users who cannot be modified” list with this command:

isi auth roles modify --add-non-modifiable-user [username]

This helps reduce the risk until a full update is possible.

  • Set or reset passwords for users who can still be modified in the System zone file provider.
  • Turn off the WebUI and API using the CLI to limit remote access.
  • Set firewall rules to restrict API and WebUI access to trusted networks only.
  • Dell urges organizations to prioritize updates based on CVSS scores and factors specific to their environment.

The company recommends customers switch to the Long-Term Support (LTS) 2025 version (9.10.1.x) and apply the latest maintenance release (9.10.1.1).

By | 2025-04-11T01:21:31+05:30 April 10th, 2025|Internet Security, Security Advisory, Security Update, Tips, vulnerability|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!