The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-21423

CVE-2026-21423: Dell PowerScale OneFS Privilege Escalation

CVE-2026-21423 is a privilege escalation vulnerability in Dell PowerScale OneFS caused by incorrect default permissions. Attackers with high privileges can exploit this for code execution and data access.

Published: March 6, 2026

CVE-2026-21423 Overview

Dell PowerScale OneFS contains an incorrect default permissions vulnerability (CWE-276) that affects versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1. This insecure permissions flaw allows a high-privileged attacker with local access to potentially exploit the vulnerability, leading to multiple severe security impacts including code execution, denial of service, elevation of privileges, and information disclosure.

Critical Impact

A privileged local attacker can exploit insecure default permissions to execute arbitrary code, escalate privileges, cause denial of service, or access sensitive information on affected Dell PowerScale OneFS storage systems.

Affected Products

  • Dell PowerScale OneFS versions prior to 9.10.1.6
  • Dell PowerScale OneFS versions 9.11.0.0 through 9.12.0.1

Discovery Timeline

  • March 4, 2026 - CVE-2026-21423 published to NVD
  • March 4, 2026 - Last updated in NVD database

Technical Details for CVE-2026-21423

Vulnerability Analysis

This vulnerability stems from incorrect default permissions (CWE-276) within Dell PowerScale OneFS, a scale-out network-attached storage operating system. The flaw allows attackers who have already achieved high-privilege local access to the system to leverage improperly configured permission settings to further compromise the storage infrastructure.

The vulnerability requires local access and high privileges to exploit, which somewhat limits the attack surface. However, the potential impacts are significant: successful exploitation can lead to arbitrary code execution within the storage system context, denial of service affecting storage availability, privilege escalation to gain additional system access, and information disclosure of sensitive data stored on the PowerScale cluster.

PowerScale OneFS manages enterprise-scale storage environments, making this vulnerability particularly concerning for organizations relying on Dell storage infrastructure for critical data operations.

Root Cause

The root cause is an incorrect default permissions configuration within Dell PowerScale OneFS. When certain system components or files are deployed with overly permissive default settings, authenticated local users with elevated privileges can abuse these misconfigurations to perform unauthorized actions. This represents a failure in the principle of least privilege, where system objects are accessible beyond what is strictly necessary for normal operations.

Attack Vector

The attack vector is local, requiring the attacker to have existing access to the PowerScale OneFS system with high privileges. The attacker can then identify and exploit the incorrectly configured default permissions to:

  1. Execute arbitrary code within the storage system context
  2. Escalate privileges beyond their current authorization level
  3. Access sensitive configuration or stored data
  4. Cause denial of service by disrupting storage operations

While the requirement for local access and high privileges reduces the likelihood of opportunistic attacks, insider threats or attackers who have already compromised a privileged account pose a significant risk to affected systems.

Detection Methods for CVE-2026-21423

Indicators of Compromise

  • Unexpected permission changes on system files or directories within the PowerScale OneFS environment
  • Anomalous process execution or system calls from privileged user accounts
  • Unusual access patterns to sensitive configuration files or storage resources
  • Evidence of privilege escalation attempts in system audit logs

Detection Strategies

  • Monitor file permission changes and access control modifications on PowerScale OneFS systems
  • Implement audit logging for privileged user activities and review logs for anomalous behavior
  • Deploy file integrity monitoring to detect unauthorized modifications to critical system components
  • Utilize SentinelOne Singularity Platform to detect suspicious local activity and potential exploitation attempts

Monitoring Recommendations

  • Enable comprehensive audit logging on all Dell PowerScale OneFS clusters
  • Configure alerts for permission modifications on sensitive system directories
  • Regularly review privileged user activities and access patterns
  • Integrate PowerScale audit logs with your SIEM solution for centralized monitoring

How to Mitigate CVE-2026-21423

Immediate Actions Required

  • Upgrade Dell PowerScale OneFS to version 9.10.1.6 or later for systems running versions prior to 9.10.1.6
  • Upgrade to the latest patched version for systems running versions 9.11.0.0 through 9.12.0.1
  • Review and restrict local access to PowerScale OneFS systems to essential personnel only
  • Audit current permission configurations on affected systems

Patch Information

Dell has released security updates to address this vulnerability as documented in Dell Security Advisory DSA-2026-038. Organizations should prioritize upgrading to PowerScale OneFS version 9.10.1.6 or later, or apply the appropriate patches for the 9.11.x and 9.12.x version branches as specified in the advisory.

Workarounds

  • Limit local access to PowerScale OneFS systems to only essential administrative personnel
  • Implement strict access controls and monitor privileged account usage
  • Review and harden default permission configurations where possible pending patch deployment
  • Isolate PowerScale clusters on segmented network zones to reduce exposure

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechDell Powerscale Onefs

  • SeverityMEDIUM

  • CVSS Score6.7

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-276
  • Vendor Resources
  • Dell Security Update DSA-2026-038
  • Related CVEs
  • CVE-2026-21421: Dell PowerScale OneFS Privilege Escalation

  • CVE-2026-21424: Dell PowerScale OneFS Privilege Escalation

  • CVE-2026-21425: Dell PowerScale OneFS Privilege Escalation

  • CVE-2026-21426: Dell PowerScale OneFS Privilege Escalation
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English