Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43723: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Dell PowerScale OneFS

0
Medium
VulnerabilityCVE-2025-43723cvecve-2025-43723cwe-327
Published: Mon Nov 10 2025 (11/10/2025, 19:10:43 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerScale OneFS

Description

Dell PowerScale OneFS, versions prior to 9.10.1.3 and versions 9.11.0.0 through 9.12.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.

AI-Powered Analysis

AILast updated: 11/10/2025, 19:19:06 UTC

Technical Analysis

CVE-2025-43723 identifies a cryptographic weakness in Dell PowerScale OneFS, a scale-out NAS storage operating system widely used in enterprise environments. The flaw stems from the use of a broken or risky cryptographic algorithm, categorized under CWE-327, which compromises the confidentiality of data processed or stored by the system. A remote attacker with network access but no authentication privileges can exploit this vulnerability to gain unauthorized access to sensitive information, such as encryption keys, credentials, or other protected data. The vulnerability affects versions prior to 9.10.1.3 and versions 9.11.0.0 through 9.12.0.0, indicating a broad range of impacted deployments. The CVSS 3.1 base score of 5.9 reflects medium severity, with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality (C:H), with no effect on integrity or availability. Although no public exploits are known, the presence of a cryptographic weakness in a critical storage platform poses a significant risk, especially in environments where sensitive or regulated data is stored. The lack of available patches at the time of disclosure necessitates interim mitigations. Organizations should monitor vendor advisories closely for updates and consider compensating controls such as enhanced network segmentation, strict access controls, and continuous monitoring for anomalous activity. This vulnerability underscores the critical need for robust cryptographic implementations in storage infrastructure to prevent data leakage and maintain compliance with data protection regulations.

Potential Impact

For European organizations, the primary impact of CVE-2025-43723 is the potential unauthorized disclosure of sensitive data stored or processed on affected Dell PowerScale OneFS systems. This can lead to breaches of confidentiality, exposing personal data, intellectual property, or business-critical information. Such exposure risks non-compliance with GDPR and other data protection laws, potentially resulting in regulatory penalties and reputational damage. The vulnerability does not affect data integrity or system availability, but the confidentiality breach alone can have severe consequences, especially for sectors like finance, healthcare, government, and critical infrastructure. Since exploitation requires remote network access but no authentication, organizations with publicly accessible or poorly segmented storage networks are at higher risk. The medium severity rating suggests that while exploitation is not trivial, the consequences of a successful attack warrant prompt attention. Additionally, the lack of known exploits currently provides a window for proactive defense. However, attackers may develop exploits over time, increasing the threat level. European enterprises relying heavily on Dell PowerScale for large-scale data storage and management should consider this vulnerability a significant risk to their data security posture.

Mitigation Recommendations

1. Apply patches and updates from Dell as soon as they become available to remediate the cryptographic weakness. 2. Until patches are released, implement strict network segmentation to isolate PowerScale OneFS systems from untrusted networks and limit access to trusted management and application hosts only. 3. Employ strong network access controls, including firewalls and VPNs, to restrict remote access to storage systems. 4. Monitor network traffic and system logs for unusual or unauthorized access attempts targeting PowerScale OneFS devices. 5. Review and harden cryptographic configurations and protocols used within the storage environment, disabling deprecated or weak algorithms where possible. 6. Conduct regular security assessments and penetration tests focused on storage infrastructure to identify and remediate potential attack vectors. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving data disclosure from storage systems. 8. Maintain an inventory of affected versions deployed across the organization to prioritize remediation efforts. 9. Coordinate with Dell support and subscribe to security advisories for timely information on patches and mitigation guidance. 10. Consider additional encryption at the application or file level as a defense-in-depth measure to protect sensitive data even if storage-level cryptography is compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-17T05:03:55.667Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69123a5b819dd34e684c541d

Added to database: 11/10/2025, 7:17:47 PM

Last enriched: 11/10/2025, 7:19:06 PM

Last updated: 11/11/2025, 1:03:47 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats