Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43723: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Dell PowerScale OneFS

0
Medium
VulnerabilityCVE-2025-43723cvecve-2025-43723cwe-327
Published: Mon Nov 10 2025 (11/10/2025, 19:10:43 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerScale OneFS

Description

CVE-2025-43723 is a medium-severity vulnerability in Dell PowerScale OneFS affecting versions prior to 9. 10. 1. 3 and 9. 11. 0. 0 through 9. 12. 0. 0.

AI-Powered Analysis

AILast updated: 11/17/2025, 20:12:42 UTC

Technical Analysis

CVE-2025-43723 identifies a cryptographic weakness in Dell PowerScale OneFS, a distributed file system widely used for enterprise storage solutions. The vulnerability stems from the use of a broken or risky cryptographic algorithm (CWE-327), which undermines the confidentiality guarantees of the system. Specifically, affected versions prior to 9.10.1.3 and from 9.11.0.0 through 9.12.0.0 implement cryptographic functions that can be exploited by an unauthenticated attacker with remote network access. The attacker does not require any privileges or user interaction to exploit this flaw, which increases the attack surface. Exploitation could allow the attacker to intercept or decrypt sensitive information stored or transmitted by the OneFS system, leading to information disclosure. However, the vulnerability does not impact data integrity or system availability. The CVSS v3.1 base score of 5.9 reflects a medium severity, considering the attack vector is network-based but requires high attack complexity. No public exploits have been reported yet, but the risk remains significant due to the critical nature of data handled by PowerScale OneFS in enterprise environments. The lack of patch links suggests that remediation may require upgrading to versions beyond 9.12.0.0 or applying vendor-provided cryptographic updates once available.

Potential Impact

For European organizations, the impact of CVE-2025-43723 is primarily the potential unauthorized disclosure of sensitive or confidential data managed by Dell PowerScale OneFS storage systems. This can affect sectors such as finance, healthcare, government, and critical infrastructure where data confidentiality is paramount. The vulnerability could lead to exposure of intellectual property, personal data protected under GDPR, or strategic business information, resulting in regulatory penalties, reputational damage, and competitive disadvantage. Since the exploit requires no authentication and can be performed remotely, attackers could leverage this vulnerability as an initial foothold or to gather intelligence without detection. The medium severity score indicates that while the attack complexity is high, the confidentiality impact is significant. European organizations relying heavily on Dell PowerScale for large-scale data storage and file sharing are at increased risk, especially if remote access controls are weak or if monitoring is insufficient.

Mitigation Recommendations

1. Upgrade Dell PowerScale OneFS to versions later than 9.12.0.0 or to the next available patched release that addresses the cryptographic weakness. 2. Until patches are available, restrict remote network access to OneFS management and data interfaces using network segmentation, firewalls, and VPNs to limit exposure. 3. Implement strict access control policies and monitor network traffic for unusual or unauthorized data access patterns indicative of exploitation attempts. 4. Employ additional encryption layers at the application or transport level (e.g., TLS 1.3) to mitigate risks from broken internal cryptography. 5. Conduct regular security audits and vulnerability assessments focusing on cryptographic configurations and compliance with best practices. 6. Maintain up-to-date incident response plans to quickly identify and contain any information disclosure incidents. 7. Engage with Dell support for guidance and early access to patches or workarounds.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-17T05:03:55.667Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69123a5b819dd34e684c541d

Added to database: 11/10/2025, 7:17:47 PM

Last enriched: 11/17/2025, 8:12:42 PM

Last updated: 12/26/2025, 3:05:44 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats