Multiple vulnerabilities in Dell PowerStore X



Risk High
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2022-1996
CVE-2022-42889
CVE-2022-29155
CVE-2018-1000805
CVE-2022-24302
CVE-2019-13990
CVE-2018-8088
CVE-2022-1471
CWE-ID CWE-942
CWE-94
CWE-89
CWE-284
CWE-362
CWE-611
CWE-502
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #8 is available.
Vulnerable software
PowerStore 9000X
Hardware solutions / Firmware

PowerStore 7000X
Hardware solutions / Firmware

PowerStore 5000X
Hardware solutions / Firmware

PowerStore 3000X
Hardware solutions / Firmware

PowerStore 1000X
Hardware solutions / Firmware

PowerStoreX OS
Hardware solutions / Firmware

Vendor Dell

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Overly permissive cross-domain whitelist

EUVDB-ID: #VU66447

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-1996

CWE-ID: CWE-942 - Overly Permissive Cross-domain Whitelist

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass the CORS protection mechanism.

The vulnerability exists due to incorrect processing of the "Origin" HTTP header that is supplied within HTTP request. A remote attacker can supply arbitrary value via the "Origin" HTTP header, bypass implemented CORS protection mechanism and perform cross-site scripting attacks against the vulnerable application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Code Injection

EUVDB-ID: #VU68307

Risk: High

CVSSv4.0: 9.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2022-42889

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to an insecure variable interpolation when processing untrusted input. A remote attacker can send a specially crafted input and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability was dubbed Text4shell.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

3) SQL injection

EUVDB-ID: #VU63343

Risk: High

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2022-29155

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the experimental back-sql backend to slapd during an LDAP search operation when the search filter is processed. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper access control

EUVDB-ID: #VU15559

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-1000805

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper access control in SSH server. A remote unauthenticated attacker can bypass access controls via unspecified vectors and execute arbitrary code.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Race condition

EUVDB-ID: #VU61662

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-24302

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a race condition in the write_private_key_file() function between creation and chmod operations. A local user can exploit the race and gain unauthorized access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) XML External Entity injection

EUVDB-ID: #VU19595

Risk: Medium

CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2019-13990

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a remote attacker to conduct an XML External Entity (XXE) attack on a targeted system.

The vulnerability exists due to insufficient validation of user-supplied XML input in the "initDocumentParser" function in the "xml/XMLSchedulingDataProcessor.java" file. A remote authenticated attacker can submit a malicious job description to the targeted system and conduct an XXE attack.


Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper access control

EUVDB-ID: #VU11301

Risk: Low

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-8088

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated attacker to bypass access restrictions on the target system.

The weakness exists in the org.slf4j.ext.EventData class due to improper security restrictions. A remote attacker can send specially crafted input, bypass access restrictions and gain unauthorized access to perform further attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Deserialization of Untrusted Data

EUVDB-ID: #VU70385

Risk: High

CVSSv4.0: 9.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2022-1471

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within the SnakeYaml's Constructor() class. A remote attacker can pass specially crafted yaml content to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerStore 9000X: All versions

PowerStore 7000X: All versions

PowerStore 5000X: All versions

PowerStore 3000X: All versions

PowerStore 1000X: All versions

PowerStoreX OS: before 3.2.1.6-2476179

CPE2.3 External links

https://www.dell.com/support/kbdoc/nl-nl/000308870/dsa-2025-182-dell-powerstore-x-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###