8
0
6
0
Vulnerability Timeline
8 vulnerabilities discovered over time for Powerscale onefs
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-25907 | 7.5 | An attacker can exploit a flaw in Dell PowerScale OneFS to lock out user accounts, causing a denial of service that prevents legitimate users from accessing the system. This requires the attacker to have remote access, but they do not need to be authenticated to take advantage of this vulnerability. | dellpowerscale onefs | Theoretical | about 1 month agoMar 4, 2026 |
| CVE-2026-22270 | 6.7 | This vulnerability allows a high-privileged attacker with local access to the Dell PowerScale OneFS system to potentially disrupt services, gain higher access rights, or access sensitive information. It affects specific versions of the software, so users running outdated versions are at risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21426 | 6.7 | This vulnerability allows a high-privileged attacker with local access to the Dell PowerScale OneFS system to potentially cause a denial of service, gain higher privileges, or access sensitive information. It affects specific versions of the software, so systems running outdated versions are at risk. | dellpowerscale onefs | Theoretical | about 1 month agoMar 4, 2026 |
| CVE-2026-21425 | 7.8 | An attacker with low-level access to a Dell PowerScale OneFS system could exploit a flaw to gain higher privileges, allowing them to perform unauthorized actions. This vulnerability affects specific versions of the software, so it’s crucial to ensure you are running an updated version to protect against this risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21424 | 6.7 | An attacker with local access to Dell PowerScale OneFS can exploit a flaw to gain higher privileges than intended, potentially allowing them to execute unauthorized actions on the system. This vulnerability affects specific versions of the software, so users should ensure they are running the latest updates to mitigate the risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21423 | 6.7 | An attacker with high privileges and local access to Dell PowerScale OneFS could exploit a flaw in default permissions to run malicious code, crash the system, gain higher access rights, or steal sensitive information. This vulnerability affects specific versions of the software, so it’s crucial to ensure you’re running an updated version to mitigate the risk. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21422 | 6.7 | This vulnerability allows a highly privileged attacker with local access to bypass security protections on Dell PowerScale OneFS, potentially compromising the system's integrity. To exploit this issue, the attacker must already have elevated access to the system, making it a concern primarily for environments where local access is not well controlled. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-21421 | 6.7 | This vulnerability allows a high-privileged attacker with local access to the Dell PowerScale OneFS system to gain even higher privileges, potentially giving them more control over the system. To exploit this, the attacker must already have local access to the device, making it a risk primarily in environments where physical security is not tightly controlled. | dellpowerscale onefs | Exploit Available | about 1 month agoMar 4, 2026 |
About Dell Powerscale onefs Security
This page provides comprehensive security vulnerability tracking for Dell Powerscale onefs. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Powerscale onefs updated to the latest version
- • Subscribe to security advisories from Dell
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately