Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22280: CWE-732: Incorrect Permission Assignment for Critical Resource in Dell PowerScale OneFS

0
Medium
VulnerabilityCVE-2026-22280cvecve-2026-22280cwe-732
Published: Thu Jan 22 2026 (01/22/2026, 19:01:11 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: PowerScale OneFS

Description

Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains an incorrect permission assignment for critical resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service.

AI-Powered Analysis

AILast updated: 01/22/2026, 19:35:15 UTC

Technical Analysis

CVE-2026-22280 is a vulnerability classified under CWE-732, which pertains to incorrect permission assignment for critical resources within Dell PowerScale OneFS storage operating system. The affected versions span from 9.5.0.0 through 9.5.1.5, 9.6.0.0 through 9.7.1.10, 9.8.0.0 through 9.10.1.3, and versions starting from 9.11.0.0 up to but not including 9.13.0.0. This vulnerability allows a low-privileged attacker who has local access to the system to exploit improperly assigned permissions on critical resources, which can lead to denial of service (DoS). The CVSS v3.1 base score is 5.0 (medium severity), with vector AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H, indicating that the attack requires local access, low attack complexity, low privileges, and user interaction, with impact limited to availability. The vulnerability does not affect confidentiality or integrity but can disrupt service availability, potentially causing operational downtime. No public exploits or patches are currently documented, but the vulnerability is officially published and recognized by Dell. The root cause is a misconfiguration or flaw in permission settings that grants inappropriate access rights to critical system resources, enabling disruption by unauthorized local users.

Potential Impact

For European organizations, the primary impact of CVE-2026-22280 is the potential for denial of service on Dell PowerScale OneFS storage systems. This can disrupt access to critical data and storage services, affecting business continuity, especially in sectors relying heavily on high-availability storage such as finance, healthcare, and manufacturing. Since the vulnerability requires local access and user interaction, insider threats or compromised internal accounts pose the greatest risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not eliminate operational risks. Organizations with extensive deployments of Dell PowerScale OneFS may face service interruptions, impacting productivity and potentially causing financial losses. The absence of known exploits in the wild reduces immediate risk but does not preclude targeted attacks, especially in environments with less stringent internal access controls.

Mitigation Recommendations

1. Restrict local access to Dell PowerScale OneFS systems strictly to trusted and authenticated personnel to minimize the risk of exploitation. 2. Implement robust user account management and monitoring to detect and prevent unauthorized local user activity. 3. Apply principle of least privilege rigorously to all local accounts to reduce the potential impact of permission misconfigurations. 4. Monitor system logs for unusual activities that could indicate attempts to exploit permission weaknesses. 5. Stay updated with Dell security advisories and apply patches or updates promptly once they become available for this vulnerability. 6. Consider deploying additional endpoint security controls on systems with local access to detect and block suspicious actions. 7. Conduct internal audits of permission settings on critical resources within OneFS to identify and remediate any misconfigurations proactively. 8. Educate local users about the risks of interacting with untrusted processes or files that could trigger exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2026-01-07T07:17:24.536Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697278984623b1157c86bd95

Added to database: 1/22/2026, 7:20:56 PM

Last enriched: 1/22/2026, 7:35:15 PM

Last updated: 2/5/2026, 6:22:39 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats