Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36601: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Dell PowerScale OneFS

0
Medium
VulnerabilityCVE-2025-36601cvecve-2025-36601cwe-200
Published: Thu Sep 25 2025 (09/25/2025, 14:54:50 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerScale OneFS

Description

Dell PowerScale OneFS, versions 9.5.0.0 through 9.11.0.0, contains an exposure of sensitive information to an unauthorized actor vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to Information disclosure.

AI-Powered Analysis

AILast updated: 09/25/2025, 15:04:12 UTC

Technical Analysis

CVE-2025-36601 is a medium-severity vulnerability identified in Dell PowerScale OneFS versions 9.5.0.0 through 9.11.0.0. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. Specifically, this flaw allows an unauthenticated remote attacker to potentially access sensitive information without requiring any privileges or user interaction. The vulnerability arises from improper access controls or information disclosure mechanisms within the OneFS software, which is Dell's scale-out NAS operating system used for managing large-scale storage clusters. The CVSS v3.1 base score is 4.0, reflecting a network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) with a low impact on confidentiality (C:L), and no impact on integrity (I:N) or availability (A:N). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system or network. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that organizations should monitor Dell advisories closely for updates. The vulnerability's exploitation could lead to unauthorized disclosure of sensitive data, which might include configuration details, system information, or other data that could facilitate further attacks or compromise privacy and compliance requirements.

Potential Impact

For European organizations, the exposure of sensitive information through this vulnerability could have significant consequences. Dell PowerScale OneFS is widely used in enterprise environments for high-performance storage solutions, including sectors such as finance, healthcare, telecommunications, and government agencies. Unauthorized disclosure of sensitive information could lead to breaches of personal data protected under GDPR, resulting in regulatory fines and reputational damage. Furthermore, leaked configuration or system information could aid attackers in crafting more targeted attacks, potentially escalating to privilege escalation or data exfiltration. The medium severity and lack of integrity or availability impact mean that while direct disruption or data manipulation is unlikely, the confidentiality breach alone poses risks to compliance and operational security. European organizations relying on Dell PowerScale for critical data storage should consider the potential for indirect impacts, such as loss of customer trust and increased scrutiny from regulators. Additionally, the vulnerability's unauthenticated remote exploitation vector increases the risk profile, as attackers do not need valid credentials or user interaction to attempt exploitation.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement compensating controls to mitigate risk. First, restrict network access to Dell PowerScale OneFS management interfaces to trusted internal networks and VPNs only, employing strict firewall rules and network segmentation to limit exposure. Enable and enforce strong authentication and authorization policies for all administrative access to reduce the attack surface. Monitor network traffic and system logs for unusual access patterns or attempts to query sensitive information remotely. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous activity targeting OneFS components. Organizations should also engage with Dell support to obtain any available interim fixes or recommended configuration changes that reduce information exposure. Once Dell releases a patch, prioritize its deployment following thorough testing to avoid operational disruptions. Additionally, conduct regular security assessments and penetration tests focusing on storage infrastructure to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-15T21:32:11.414Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d558e1bbd73d20e5f4081b

Added to database: 9/25/2025, 2:59:45 PM

Last enriched: 9/25/2025, 3:04:12 PM

Last updated: 10/7/2025, 9:52:59 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats