CVE-2025-30102: CWE-787: Out-of-bounds Write in Dell PowerScale OneFS
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.1.0, contains an out-of-bounds write vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to denial of service.
AI Analysis
Technical Summary
CVE-2025-30102 is a vulnerability identified in Dell PowerScale OneFS versions 9.4.0.0 through 9.10.1.0. The issue is classified as an out-of-bounds write (CWE-787), which occurs when a program writes data outside the boundaries of allocated memory. This flaw can be exploited by a local attacker with low privileges on the affected system. Exploitation does not require user interaction and can lead to a denial of service (DoS) condition by corrupting memory, potentially causing the OneFS service or the entire system to crash or become unstable. The vulnerability has a CVSS 3.1 base score of 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring the attacker to have some level of access to the system, but only low privileges (PR:L) are necessary. The vulnerability does not impact confidentiality or integrity but affects availability (A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in March 2025 and published in May 2025, indicating it is a recent discovery. Dell PowerScale OneFS is a scale-out network-attached storage platform widely used in enterprise environments for large-scale data storage and management, often in sectors requiring high availability and performance such as media, healthcare, and research institutions.
Potential Impact
For European organizations using Dell PowerScale OneFS, this vulnerability poses a risk primarily to system availability. A successful local exploit could cause service interruptions, impacting business continuity, especially in environments relying on continuous access to large datasets. Industries such as finance, healthcare, telecommunications, and public sector entities that depend on high availability storage solutions could experience operational disruptions. Although the vulnerability requires local access, insider threats or attackers who have gained initial footholds through other means could leverage this flaw to escalate denial of service attacks. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate the risk of operational downtime, which can have significant financial and reputational consequences. Given the critical nature of storage infrastructure, even medium-severity DoS vulnerabilities warrant prompt attention in European organizations where regulatory requirements emphasize availability and resilience.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict local access to Dell PowerScale OneFS systems by enforcing strict access controls and limiting user privileges to the minimum necessary. 2) Monitor and audit local user activities to detect any unusual behavior that could indicate attempts to exploit this vulnerability. 3) Apply network segmentation to isolate storage systems from general user networks, reducing the risk of unauthorized local access. 4) Maintain up-to-date backups and disaster recovery plans to mitigate the impact of potential service disruptions. 5) Engage with Dell support and subscribe to official security advisories to obtain patches or workarounds as soon as they become available. 6) Consider deploying host-based intrusion detection systems (HIDS) on storage nodes to detect anomalous memory corruption or crashes. 7) Conduct regular vulnerability assessments and penetration testing focused on local privilege escalation and memory corruption vectors to proactively identify exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Spain, Belgium
CVE-2025-30102: CWE-787: Out-of-bounds Write in Dell PowerScale OneFS
Description
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.1.0, contains an out-of-bounds write vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-30102 is a vulnerability identified in Dell PowerScale OneFS versions 9.4.0.0 through 9.10.1.0. The issue is classified as an out-of-bounds write (CWE-787), which occurs when a program writes data outside the boundaries of allocated memory. This flaw can be exploited by a local attacker with low privileges on the affected system. Exploitation does not require user interaction and can lead to a denial of service (DoS) condition by corrupting memory, potentially causing the OneFS service or the entire system to crash or become unstable. The vulnerability has a CVSS 3.1 base score of 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring the attacker to have some level of access to the system, but only low privileges (PR:L) are necessary. The vulnerability does not impact confidentiality or integrity but affects availability (A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in March 2025 and published in May 2025, indicating it is a recent discovery. Dell PowerScale OneFS is a scale-out network-attached storage platform widely used in enterprise environments for large-scale data storage and management, often in sectors requiring high availability and performance such as media, healthcare, and research institutions.
Potential Impact
For European organizations using Dell PowerScale OneFS, this vulnerability poses a risk primarily to system availability. A successful local exploit could cause service interruptions, impacting business continuity, especially in environments relying on continuous access to large datasets. Industries such as finance, healthcare, telecommunications, and public sector entities that depend on high availability storage solutions could experience operational disruptions. Although the vulnerability requires local access, insider threats or attackers who have gained initial footholds through other means could leverage this flaw to escalate denial of service attacks. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate the risk of operational downtime, which can have significant financial and reputational consequences. Given the critical nature of storage infrastructure, even medium-severity DoS vulnerabilities warrant prompt attention in European organizations where regulatory requirements emphasize availability and resilience.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict local access to Dell PowerScale OneFS systems by enforcing strict access controls and limiting user privileges to the minimum necessary. 2) Monitor and audit local user activities to detect any unusual behavior that could indicate attempts to exploit this vulnerability. 3) Apply network segmentation to isolate storage systems from general user networks, reducing the risk of unauthorized local access. 4) Maintain up-to-date backups and disaster recovery plans to mitigate the impact of potential service disruptions. 5) Engage with Dell support and subscribe to official security advisories to obtain patches or workarounds as soon as they become available. 6) Consider deploying host-based intrusion detection systems (HIDS) on storage nodes to detect anomalous memory corruption or crashes. 7) Conduct regular vulnerability assessments and penetration testing focused on local privilege escalation and memory corruption vectors to proactively identify exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- dell
- Date Reserved
- 2025-03-17T05:03:47.267Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd8179
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 4:54:46 AM
Last updated: 1/7/2026, 4:24:32 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.