CVE-2026-22280 Overview
Dell PowerScale OneFS contains an incorrect permission assignment for critical resource vulnerability that affects multiple versions of the enterprise-class scale-out NAS platform. A low privileged attacker with local access could potentially exploit this vulnerability to cause a denial of service condition, disrupting storage operations and potentially impacting business-critical data access.
Critical Impact
Local attackers with low privileges can exploit improper file system permissions to cause denial of service on Dell PowerScale OneFS storage systems, potentially disrupting enterprise storage operations.
Affected Products
- Dell PowerScale OneFS versions 9.5.0.0 through 9.5.1.5
- Dell PowerScale OneFS versions 9.6.0.0 through 9.7.1.10
- Dell PowerScale OneFS versions 9.8.0.0 through 9.10.1.3
- Dell PowerScale OneFS versions 9.11.0.0 and prior to 9.13.0.0
Discovery Timeline
- 2026-01-22 - CVE CVE-2026-22280 published to NVD
- 2026-01-22 - Last updated in NVD database
Technical Details for CVE-2026-22280
Vulnerability Analysis
This vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource), which occurs when a product assigns permissions to a sensitive resource in a way that unintended parties can access or modify that resource. In the context of Dell PowerScale OneFS, the vulnerability allows a low-privileged local attacker to exploit misconfigured permissions on critical system resources.
The attack requires local access to the system and low privileges to execute. While user interaction is required for successful exploitation, the impact primarily affects system availability without compromising data confidentiality or integrity. The vulnerability's exploitability is enhanced by the low attack complexity, meaning an attacker does not need sophisticated techniques or specialized access conditions to trigger the denial of service condition.
Root Cause
The root cause of CVE-2026-22280 stems from improper permission assignment on critical system resources within the Dell PowerScale OneFS operating system. The file system permissions are configured in a manner that grants excessive access to low-privileged users, allowing them to interact with sensitive resources that should be restricted. This misconfiguration in access control logic enables unauthorized operations that can lead to resource exhaustion or service disruption.
Attack Vector
The attack vector for this vulnerability is local, requiring the attacker to have authenticated access to the PowerScale OneFS system. The exploitation path involves:
- Attaining local access to the PowerScale OneFS system with low-privilege credentials
- Identifying critical resources with misconfigured permissions
- Performing operations on these resources that trigger denial of service conditions
- The system becomes unavailable or significantly degraded, affecting storage operations
The vulnerability requires user interaction for successful exploitation, which may involve an administrator or user performing a specific action that enables the attack to succeed.
Detection Methods for CVE-2026-22280
Indicators of Compromise
- Unusual permission changes on critical system files or directories within the OneFS file system
- Unexpected service crashes or restarts on PowerScale nodes
- Anomalous local user activity patterns, particularly from low-privileged accounts accessing sensitive resources
- Elevated error rates in system logs related to resource access or permission denials
Detection Strategies
- Monitor for permission modification events on critical OneFS system resources using audit logging
- Implement file integrity monitoring (FIM) to detect unauthorized changes to system configurations
- Configure alerting for unusual local authentication patterns or privilege usage
- Review access logs for low-privileged accounts attempting to access protected resources
Monitoring Recommendations
- Enable comprehensive audit logging on all PowerScale OneFS nodes to capture authentication and authorization events
- Implement centralized log collection and analysis for correlation of potential attack patterns
- Configure real-time alerting for service availability degradation on storage clusters
- Regularly review system permission configurations against baseline security standards
How to Mitigate CVE-2026-22280
Immediate Actions Required
- Upgrade Dell PowerScale OneFS to version 9.13.0.0 or later to address this vulnerability
- Audit current user accounts and remove unnecessary local access privileges
- Review and restrict permissions on critical system resources to follow least-privilege principles
- Implement additional monitoring on affected systems until patching is complete
Patch Information
Dell has released security updates to address this vulnerability. Organizations should upgrade to Dell PowerScale OneFS version 9.13.0.0 or later. For detailed patch information and download instructions, refer to the Dell Security Update Advisory.
Workarounds
- Restrict local access to PowerScale OneFS systems to only essential personnel with business justification
- Implement strict role-based access controls to limit low-privileged user capabilities
- Consider network segmentation to limit access to management interfaces
- Enable enhanced audit logging to detect potential exploitation attempts
# Example: Review current permission settings on OneFS
isi auth access /ifs --detailed
# Example: Audit user privileges on the system
isi auth users list --verbose
# Example: Enable audit logging for file access
isi audit settings global modify --audit-success=write,delete,security --audit-failure=all
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


