Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27690: CWE-1393: Use of Default Password in Dell PowerScale OneFS

0
Critical
VulnerabilityCVE-2025-27690cvecve-2025-27690cwe-1393
Published: Thu Apr 10 2025 (04/10/2025, 02:04:43 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerScale OneFS

Description

Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:59:30 UTC

Technical Analysis

CVE-2025-27690 is a critical security vulnerability identified in Dell PowerScale OneFS storage operating system versions 9.5.0.0 through 9.10.1.0. The vulnerability arises from the use of a default password that remains enabled and accessible remotely without requiring authentication or user interaction. This default credential allows an attacker with network access to the affected system to authenticate as a high privileged user, potentially the root or administrative account. The vulnerability is classified under CWE-1393, which pertains to the use of default passwords, a common and dangerous security oversight. The CVSS v3.1 base score of 9.8 reflects the vulnerability's high exploitability (network vector, no privileges required, no user interaction) and severe impact on confidentiality, integrity, and availability. Successful exploitation could enable attackers to take full control of the storage system, manipulate or exfiltrate sensitive data, disrupt storage services, and potentially pivot to other parts of the network. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical risk. Dell has not yet published patches or mitigations at the time of this report, increasing urgency for organizations to implement compensating controls. The vulnerability affects multiple OneFS versions widely deployed in enterprise storage environments, making it a significant concern for data centers and organizations relying on Dell PowerScale for scalable storage solutions.

Potential Impact

The impact of CVE-2025-27690 is severe for organizations worldwide using Dell PowerScale OneFS in affected versions. An attacker exploiting this vulnerability can gain unauthorized administrative access remotely without authentication, leading to complete system compromise. This can result in unauthorized data access, data theft, data manipulation, or deletion, severely impacting data confidentiality and integrity. Availability can also be affected if attackers disrupt storage services or deploy ransomware or destructive payloads. Given the critical role of PowerScale OneFS in enterprise storage infrastructures, such a compromise could disrupt business operations, cause significant financial losses, and damage organizational reputation. Additionally, attackers could leverage compromised systems as footholds for lateral movement within corporate networks, escalating the overall risk. The lack of required user interaction and ease of exploitation increase the likelihood of attacks, especially in environments with exposed management interfaces or insufficient network segmentation. Organizations in sectors with high data sensitivity, such as finance, healthcare, government, and large enterprises, face heightened risks due to the potential exposure of critical or regulated data.

Mitigation Recommendations

To mitigate CVE-2025-27690 effectively, organizations should immediately audit all Dell PowerScale OneFS systems to identify affected versions. Until official patches are released, the following specific actions are recommended: 1) Disable or change any default passwords on the affected systems, ensuring strong, unique credentials are used for all administrative accounts. 2) Restrict network access to management interfaces of PowerScale OneFS systems using firewalls, VPNs, or network segmentation to limit exposure only to trusted administrators. 3) Implement multi-factor authentication (MFA) where supported to add an additional layer of security beyond passwords. 4) Monitor logs and network traffic for unusual authentication attempts or access patterns indicative of exploitation attempts. 5) Apply strict access control policies and least privilege principles to minimize potential damage if compromise occurs. 6) Stay informed on Dell’s security advisories and apply official patches or updates as soon as they become available. 7) Conduct regular security assessments and penetration testing focused on storage infrastructure to detect and remediate similar vulnerabilities proactively. These targeted measures go beyond generic advice by focusing on immediate password management, network access controls, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-03-05T07:33:28.315Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1c385912abc71d0b6ac

Added to database: 2/26/2026, 7:40:51 PM

Last enriched: 2/26/2026, 7:59:30 PM

Last updated: 2/26/2026, 10:56:43 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses