Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22278: CWE-307: Improper Restriction of Excessive Authentication Attempts in Dell PowerScale OneFS

0
High
VulnerabilityCVE-2026-22278cvecve-2026-22278cwe-307
Published: Thu Jan 22 2026 (01/22/2026, 16:16:51 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerScale OneFS

Description

Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:41:56 UTC

Technical Analysis

CVE-2026-22278 addresses a vulnerability in Dell PowerScale OneFS, a scale-out NAS storage operating system widely used in enterprise environments for large-scale data storage. The vulnerability is categorized under CWE-307, indicating improper restriction of excessive authentication attempts. This means the system does not adequately limit the number or rate of authentication attempts, allowing an attacker to perform brute force or credential stuffing attacks remotely without authentication. The CVSS 3.1 base score of 8.1 reflects a high severity, with attack vector being network (AV:N), requiring no privileges (PR:N), no user interaction (UI:N), but with high attack complexity (AC:H). The impact metrics indicate high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), meaning successful exploitation could lead to full system compromise, unauthorized data access, and potential service disruption. The vulnerability affects versions prior to 9.13.0.0, though specific affected versions are not enumerated. No patches or exploits are currently publicly available, but the risk remains significant due to the critical nature of the affected product and the potential for unauthorized access. Dell PowerScale OneFS is commonly deployed in data centers, cloud providers, and enterprises requiring robust storage solutions, making this vulnerability relevant to organizations with sensitive or critical data infrastructure.

Potential Impact

The potential impact of CVE-2026-22278 is substantial for organizations relying on Dell PowerScale OneFS for their storage infrastructure. Unauthorized access resulting from brute force or credential stuffing attacks could lead to data breaches involving sensitive or proprietary information, undermining confidentiality. Integrity of stored data could be compromised if attackers gain write access, enabling data manipulation or destruction. Availability could also be affected if attackers disrupt authentication services or leverage access to disable storage nodes, causing operational downtime. Given the high attack complexity but no requirement for authentication or user interaction, motivated attackers with network access could exploit this vulnerability remotely. This poses a significant risk to enterprises, cloud service providers, and government agencies that use PowerScale OneFS for critical workloads. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time. The vulnerability could also facilitate lateral movement within networks if attackers gain initial footholds through compromised credentials.

Mitigation Recommendations

Organizations should immediately inventory their Dell PowerScale OneFS deployments to identify versions prior to 9.13.0.0 and plan for prompt upgrades once patches are released by Dell. Until patches are available, implement compensating controls such as network segmentation to restrict remote access to OneFS management interfaces, enforcing strict firewall rules and VPN requirements. Deploy multi-factor authentication (MFA) on all administrative and user accounts to reduce the risk of credential-based attacks. Monitor authentication logs for unusual or excessive login attempts and configure alerts for brute force patterns. Employ rate limiting or account lockout policies where possible to mitigate excessive authentication attempts. Regularly update and audit credentials, ensuring strong password policies are enforced. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect brute force activity targeting OneFS. Engage with Dell support for any available workarounds or interim fixes. Finally, conduct security awareness training for administrators to recognize and respond to suspicious authentication activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-07T07:17:24.536Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697251f54623b1157c7bcf85

Added to database: 1/22/2026, 4:36:05 PM

Last enriched: 2/27/2026, 8:41:56 AM

Last updated: 3/25/2026, 4:36:27 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses