dell emc-powerscale-onefs CVE-2022-22560 is a vulnerability in Dell Emc Powerscale Onefs
Published on April 12, 2022

Dell EMC PowerScale OneFS 8.1.x - 9.1.x contain hard coded credentials. This allows a local user with knowledge of the credentials to login as the admin user to the backend ethernet switch of a PowerScale cluster. The attacker can exploit this vulnerability to take the switch offline.

NVD

Vulnerability Analysis

CVE-2022-22560 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity, and a high impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

Use of Hard-coded Credentials

The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.


Products Associated with CVE-2022-22560

Want to know whenever a new CVE is published for Dell Emc Powerscale Onefs? stack.watch will email you.

 

Affected Versions

Dell PowerScale OneFS Version 8.1.x-9.2.1.x is affected by CVE-2022-22560

Exploit Probability

EPSS
0.03%
Percentile
9.78%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.