Description
Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an uncontrolled search path element vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, elevation of privileges, and information disclosure.
Published: 2026-03-04
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation, Denial of Service, Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

Dell PowerScale OneFS suffers from an uncontrolled search path element flaw that permits a local user with high privileges to execute arbitrary commands during system operations. This vulnerability can cause denial of service, elevate a user’s effective privileges beyond their intended scope, and expose sensitive system information. The weakness is categorized as CWE‑427, which describes the unauthorized use of an environmental variable to influence program execution.

Affected Systems

The affected product is Dell PowerScale OneFS. Versions prior to 9.10.1.6 and those ranging from 9.11.0.0 through 9.12.0.1 are vulnerable. Installing any release equal to or greater than 9.10.1.6 or 9.12.0.2 resolves the issue.

Risk and Exploitability

The CVSS score of 6.7 indicates a moderate-to-high risk, while the EPSS probability is below 1%, suggesting low likelihood of active exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, but the combination of local privileged access and uncontrolled path traversal still warrants prompt attention, as it could be leveraged by an insider or compromised service account. The attack vector involves local system access with elevated rights; no remote exploitation pathways are documented.

Generated by OpenCVE AI on April 17, 2026 at 13:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Dell’s DSA‑2026‑038 security update to upgrade OneFS to 9.10.1.6 or a newer release such as 9.12.0.2 that removes the unsupported search path element.
  • If an immediate upgrade is not feasible, enforce the principle of least privilege by restricting local administrator accounts, disabling unnecessary executable paths, and monitoring for anomalous process activity related to path traversal.
  • Audit and cleanse the system PATH configuration on all affected nodes to ensure no unauthorized or unsupported directories are included, preventing unintended search path usage.

Generated by OpenCVE AI on April 17, 2026 at 13:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
Title Uncontrolled Search Path Element in Dell PowerScale OneFS Enables Local Privilege Escalation and Denial of Service

Wed, 04 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell powerscale Onefs
CPEs cpe:2.3:o:dell:powerscale_onefs:*:*:*:*:*:*:*:*
Vendors & Products Dell
Dell powerscale Onefs

Wed, 04 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Description Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an uncontrolled search path element vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, elevation of privileges, and information disclosure.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Dell Powerscale Onefs
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2026-03-05T04:55:36.427Z

Reserved: 2026-01-07T06:43:46.537Z

Link: CVE-2026-22270

cve-icon Vulnrichment

Updated: 2026-03-04T15:27:13.213Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T13:15:57.967

Modified: 2026-03-04T20:46:14.810

Link: CVE-2026-22270

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:15:19Z

Weaknesses