CVE-2026-22280: CWE-732: Incorrect Permission Assignment for Critical Resource in Dell PowerScale OneFS
Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains an incorrect permission assignment for critical resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service.
AI Analysis
Technical Summary
CVE-2026-22280 is a vulnerability classified under CWE-732, which pertains to incorrect permission assignment for critical resources within Dell PowerScale OneFS storage operating system. The affected versions span from 9.5.0.0 through 9.5.1.5, 9.6.0.0 through 9.7.1.10, 9.8.0.0 through 9.10.1.3, and versions starting from 9.11.0.0 up to but not including 9.13.0.0. This vulnerability allows a low-privileged attacker who has local access to the system to exploit improperly assigned permissions on critical resources, which can lead to denial of service (DoS). The CVSS v3.1 base score is 5.0 (medium severity), with vector AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H, indicating that the attack requires local access, low attack complexity, low privileges, and user interaction, with impact limited to availability. The vulnerability does not affect confidentiality or integrity but can disrupt service availability, potentially causing operational downtime. No public exploits or patches are currently documented, but the vulnerability is officially published and recognized by Dell. The root cause is a misconfiguration or flaw in permission settings that grants inappropriate access rights to critical system resources, enabling disruption by unauthorized local users.
Potential Impact
For European organizations, the primary impact of CVE-2026-22280 is the potential for denial of service on Dell PowerScale OneFS storage systems. This can disrupt access to critical data and storage services, affecting business continuity, especially in sectors relying heavily on high-availability storage such as finance, healthcare, and manufacturing. Since the vulnerability requires local access and user interaction, insider threats or compromised internal accounts pose the greatest risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate operational risks. Organizations with extensive deployments of Dell PowerScale OneFS may face service interruptions, impacting productivity and potentially causing financial losses. The absence of known exploits in the wild reduces immediate risk but does not preclude targeted attacks, especially in environments with less stringent internal access controls.
Mitigation Recommendations
1. Restrict local access to Dell PowerScale OneFS systems strictly to trusted and authenticated personnel to minimize the risk of exploitation. 2. Implement robust user account management and monitoring to detect and prevent unauthorized local user activity. 3. Apply principle of least privilege rigorously to all local accounts to reduce the potential impact of permission misconfigurations. 4. Monitor system logs for unusual activities that could indicate attempts to exploit permission weaknesses. 5. Stay updated with Dell security advisories and apply patches or updates promptly once they become available for this vulnerability. 6. Consider deploying additional endpoint security controls on systems with local access to detect and block suspicious actions. 7. Conduct internal audits of permission settings on critical resources within OneFS to identify and remediate any misconfigurations proactively. 8. Educate local users about the risks of interacting with untrusted processes or files that could trigger exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2026-22280: CWE-732: Incorrect Permission Assignment for Critical Resource in Dell PowerScale OneFS
Description
Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains an incorrect permission assignment for critical resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2026-22280 is a vulnerability classified under CWE-732, which pertains to incorrect permission assignment for critical resources within Dell PowerScale OneFS storage operating system. The affected versions span from 9.5.0.0 through 9.5.1.5, 9.6.0.0 through 9.7.1.10, 9.8.0.0 through 9.10.1.3, and versions starting from 9.11.0.0 up to but not including 9.13.0.0. This vulnerability allows a low-privileged attacker who has local access to the system to exploit improperly assigned permissions on critical resources, which can lead to denial of service (DoS). The CVSS v3.1 base score is 5.0 (medium severity), with vector AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H, indicating that the attack requires local access, low attack complexity, low privileges, and user interaction, with impact limited to availability. The vulnerability does not affect confidentiality or integrity but can disrupt service availability, potentially causing operational downtime. No public exploits or patches are currently documented, but the vulnerability is officially published and recognized by Dell. The root cause is a misconfiguration or flaw in permission settings that grants inappropriate access rights to critical system resources, enabling disruption by unauthorized local users.
Potential Impact
For European organizations, the primary impact of CVE-2026-22280 is the potential for denial of service on Dell PowerScale OneFS storage systems. This can disrupt access to critical data and storage services, affecting business continuity, especially in sectors relying heavily on high-availability storage such as finance, healthcare, and manufacturing. Since the vulnerability requires local access and user interaction, insider threats or compromised internal accounts pose the greatest risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate operational risks. Organizations with extensive deployments of Dell PowerScale OneFS may face service interruptions, impacting productivity and potentially causing financial losses. The absence of known exploits in the wild reduces immediate risk but does not preclude targeted attacks, especially in environments with less stringent internal access controls.
Mitigation Recommendations
1. Restrict local access to Dell PowerScale OneFS systems strictly to trusted and authenticated personnel to minimize the risk of exploitation. 2. Implement robust user account management and monitoring to detect and prevent unauthorized local user activity. 3. Apply principle of least privilege rigorously to all local accounts to reduce the potential impact of permission misconfigurations. 4. Monitor system logs for unusual activities that could indicate attempts to exploit permission weaknesses. 5. Stay updated with Dell security advisories and apply patches or updates promptly once they become available for this vulnerability. 6. Consider deploying additional endpoint security controls on systems with local access to detect and block suspicious actions. 7. Conduct internal audits of permission settings on critical resources within OneFS to identify and remediate any misconfigurations proactively. 8. Educate local users about the risks of interacting with untrusted processes or files that could trigger exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dell
- Date Reserved
- 2026-01-07T07:17:24.536Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697278984623b1157c86bd95
Added to database: 1/22/2026, 7:20:56 PM
Last enriched: 1/22/2026, 7:35:15 PM
Last updated: 2/5/2026, 6:22:39 PM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls
HighCVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html
HighCVE-2025-47911: CWE-400: Uncontrolled Resource Consumption in golang.org/x/net golang.org/x/net/html
HighCVE-2025-15557: CWE-295 Improper Certificate Validation in TP-Link Systems Inc. Tapo H100 v1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.