Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-10499 | Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account. |
Solution
No solution given by the vendor.
Workaround
These independent workarounds can be in place until an upgrade to a fixed release, or patch can be applied. Note: Authentication Provider hash types can be viewed with isi auth file view System in the "Password Hash Type" entry. Workaround 1: Add the impacted users to the "Users who cannot be modified" list. For clusters that have not switched to SHA256 or SHA512 hash types: isi auth file modify System --add-unmodifiable-users=compadmin,remotesupport,ese,insightiq,www,nobody,git_daemon,isdmgmt --remove-modifiable-users=compadmin,remotesupport,ese,insightiq,www,nobody,git_daemon,isdmgmt --restrict-modifiable=true For clusters that have switched to SHA256 or SHA512 hash types: Add above users, but also include other file provider users with system privileges: isi auth file modify System --add-unmodifiable-users=root,admin --remove-modifiable-users=root,admin --restrict-modifiable=true Once the patch is applied, if you use the users, you can make them modifiable again. Workaround 2: For clusters that have not switched to SHA256 or SHA512 hash types. Set/reset password for users that are not blocked for modification in the System zone file provider, as well as disabling them. * compadmin, remotesupport, ese, insightiq, www, nobody, git_daemon, isdmgmt Workaround 3: Disable the WebUI and API via CLI isi http services modify Platform-API-External --enabled=false This does not completely mitigate the issue as it could still be abused by users with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH. Workaround 4: Limit access to API & WebUI to trusted networks via firewall rule * Enable the firewall * In "default_pools_policy" modify "rule_isi_webui" to restrict "source network" to a trusted set of networks/IPs This does not completely mitigate the issue as it could still be abused by users with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH, as well as users on the IPs allowed through the firewall.
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dell
Dell powerscale Onefs |
|
CPEs | cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dell
Dell powerscale Onefs |
Thu, 10 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Apr 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account. | |
Weaknesses | CWE-1393 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: dell
Published:
Updated: 2025-04-11T03:55:24.269Z
Reserved: 2025-03-05T07:33:28.315Z
Link: CVE-2025-27690

Updated: 2025-04-10T14:28:18.975Z

Status : Analyzed
Published: 2025-04-10T03:15:19.210
Modified: 2025-07-11T16:43:26.720
Link: CVE-2025-27690

No data.

No data.