Learn about CVE-2023-22572, a vulnerability in Dell PowerScale OneFS versions 9.1.0.x through 9.4.0.x, allowing local attacker exploitation. Impact rated high with CVSSv3.1 base score of 7.8.
This CVE-2023-22572 pertains to a vulnerability found in Dell PowerScale OneFS versions 9.1.0.x through 9.4.0.x. The vulnerability involves the insertion of sensitive information into log files through the change password API, which could potentially be exploited by a low-privileged local attacker, leading to a system takeover.
Understanding CVE-2023-22572
This section delves deeper into the details of the CVE-2023-22572 vulnerability.
What is CVE-2023-22572?
CVE-2023-22572 involves a vulnerability in Dell PowerScale OneFS versions 9.1.0.x through 9.4.0.x, where sensitive information is inserted into log files via the change password API. This vulnerability could be exploited by a low-privileged local attacker.
The Impact of CVE-2023-22572
The impact of this vulnerability is rated as high, with a CVSSv3.1 base score of 7.8. The attack complexity is low, and the attack vector is local. The confidentiality, integrity, and availability impacts are all high.
Technical Details of CVE-2023-22572
This section provides technical details regarding the CVE-2023-22572 vulnerability.
Vulnerability Description
The vulnerability involves the insertion of sensitive information into log files in Dell PowerScale OneFS versions 9.1.0.x through 9.4.0.x via the change password API.
Affected Systems and Versions
The affected systems include Dell PowerScale OneFS versions 9.1.0.x through 9.4.0.x.
Exploitation Mechanism
A low-privileged local attacker could potentially exploit this vulnerability, leading to a system takeover.
Mitigation and Prevention
To address CVE-2023-22572, it is crucial to take immediate steps and implement long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Dell has released security updates for Dell PowerScale OneFS to address this vulnerability. It is recommended to apply these patches promptly to mitigate the risk of exploitation.