Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43724: CWE-639: Authorization Bypass Through User-Controlled Key in Dell PowerScale OneFS

0
Medium
VulnerabilityCVE-2025-43724cvecve-2025-43724cwe-639
Published: Wed Oct 08 2025 (10/08/2025, 14:45:47 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerScale OneFS

Description

Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an authorization bypass through user-controlled key vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to gain unauthorized access to NFSv4 or SMB shares.

AI-Powered Analysis

AILast updated: 10/08/2025, 15:09:55 UTC

Technical Analysis

CVE-2025-43724 is a medium-severity vulnerability affecting Dell PowerScale OneFS storage systems prior to version 9.12.0.0. The flaw is categorized under CWE-639, which involves authorization bypass through a user-controlled key. Specifically, a high-privileged attacker with local access can manipulate a key parameter to bypass authorization controls, thereby gaining unauthorized access to network file shares served via NFSv4 or SMB protocols. This vulnerability does not compromise confidentiality or integrity directly but impacts availability by potentially allowing unauthorized access to shares, which could lead to denial of service or unauthorized resource consumption. The attack vector is local, requiring the attacker to have elevated privileges on the system, and no user interaction is necessary. The CVSS v3.1 base score is 4.4, reflecting the limited scope and required conditions for exploitation. No public exploits or patches are currently available, indicating that organizations must rely on access controls and monitoring until a fix is released. The vulnerability is significant for environments relying on Dell PowerScale OneFS for critical file storage and sharing, especially where local access controls may be insufficient or where insider threats are a concern.

Potential Impact

For European organizations, the impact primarily concerns availability and operational continuity of file sharing services using Dell PowerScale OneFS. Unauthorized access to NFSv4 or SMB shares could disrupt normal operations, cause denial of service, or allow malicious insiders to interfere with file availability. While confidentiality and integrity are not directly affected, the ability to bypass authorization controls undermines trust in access management and could facilitate further attacks or data misuse. Organizations in sectors with high reliance on shared storage—such as finance, manufacturing, and public services—may face operational risks. The requirement for high-privileged local access limits the threat to insider attackers or those who have already compromised a system, but the potential for lateral movement or privilege escalation remains a concern. Given the widespread use of Dell PowerScale in European data centers, the vulnerability could affect critical infrastructure and enterprise environments if not addressed promptly.

Mitigation Recommendations

1. Restrict local access to Dell PowerScale OneFS systems strictly to trusted, high-privileged users and administrators. 2. Implement robust monitoring and logging of local access and file share usage to detect anomalous behavior indicative of exploitation attempts. 3. Enforce the principle of least privilege to minimize the number of users with high-level local access. 4. Use network segmentation to isolate storage systems and limit exposure of NFSv4 and SMB shares. 5. Prepare for rapid deployment of patches once Dell releases an update addressing this vulnerability; subscribe to Dell security advisories for timely information. 6. Conduct regular security audits and penetration tests focusing on local privilege escalation and authorization bypass scenarios. 7. Consider additional endpoint protection measures on systems with local access to detect and prevent misuse of credentials or keys. 8. Educate administrators about the risks of this vulnerability and the importance of strict access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-17T05:03:55.667Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e67ead724b643b1d67f7a8

Added to database: 10/8/2025, 3:09:33 PM

Last enriched: 10/8/2025, 3:09:55 PM

Last updated: 10/9/2025, 3:35:43 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats