Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-10499 Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.
Fixes

Solution

No solution given by the vendor.


Workaround

These independent workarounds can be in place until an upgrade to a fixed release, or patch can be applied. Note: Authentication Provider hash types can be viewed with isi auth file view System in the "Password Hash Type" entry. Workaround 1: Add the impacted users to the "Users who cannot be modified" list. For clusters that have not switched to SHA256 or SHA512 hash types: isi auth file modify System --add-unmodifiable-users=compadmin,remotesupport,ese,insightiq,www,nobody,git_daemon,isdmgmt --remove-modifiable-users=compadmin,remotesupport,ese,insightiq,www,nobody,git_daemon,isdmgmt --restrict-modifiable=true For clusters that have switched to SHA256 or SHA512 hash types: Add above users, but also include other file provider users with system privileges: isi auth file modify System --add-unmodifiable-users=root,admin --remove-modifiable-users=root,admin --restrict-modifiable=true Once the patch is applied, if you use the users, you can make them modifiable again. Workaround 2: For clusters that have not switched to SHA256 or SHA512 hash types. Set/reset password for users that are not blocked for modification in the System zone file provider, as well as disabling them. * compadmin, remotesupport, ese, insightiq, www, nobody, git_daemon, isdmgmt Workaround 3: Disable the WebUI and API via CLI isi http services modify Platform-API-External --enabled=false This does not completely mitigate the issue as it could still be abused by users with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH. Workaround 4: Limit access to API & WebUI to trusted networks via firewall rule * Enable the firewall * In "default_pools_policy" modify "rule_isi_webui" to restrict "source network" to a trusted set of networks/IPs This does not completely mitigate the issue as it could still be abused by users with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH, as well as users on the IPs allowed through the firewall.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00147}

epss

{'score': 0.00121}


Fri, 11 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell powerscale Onefs
CPEs cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*
Vendors & Products Dell
Dell powerscale Onefs

Thu, 10 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Apr 2025 02:45:00 +0000

Type Values Removed Values Added
Description Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.
Weaknesses CWE-1393
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2025-04-11T03:55:24.269Z

Reserved: 2025-03-05T07:33:28.315Z

Link: CVE-2025-27690

cve-icon Vulnrichment

Updated: 2025-04-10T14:28:18.975Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-10T03:15:19.210

Modified: 2025-07-11T16:43:26.720

Link: CVE-2025-27690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.