Impact
The vulnerability originates from use of default credentials within the operating system of Dell ECS and ObjectScale. Because default credentials are left unchanged, an attacker who already has low‑privileged remote access can trigger an elevation of privileges, potentially gaining higher administrative rights without needing to bypass authentication. This can compromise confidentiality, integrity, and availability of the data stored within the impacted ObjectScale services.
Affected Systems
Affected products are Dell Elastic Cloud Storage version 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.2.0.0. These versions run on Dell's integrated storage platform, exposing the default credential risk across all nodes within those deployments.
Risk and Exploitability
The CVSS score of 8.8 indicates a high impact severity, while the EPSS score of less than 1% suggests a low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is likely remote, although the exact network requirements are not stated, so the inference is that the attacker must be able to reach the target via the network and possess at least low‑privileged credentials. Once the attacker authenticates using default credentials, privilege escalation may ensue. Documentation does not indicate additional prerequisites, so successful exploitation should result from the presence of unchanged default passwords.
OpenCVE Enrichment