CVE-2026-21424
Privilege Escalation in Dell PowerScale OneFS via Excessive Privileges
Publication date: 2026-03-04
Last updated on: 2026-03-04
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | powerscale_onefs | to 9.10.1.6 (exc) |
| dell | powerscale_onefs | From 9.11.0.0 (inc) to 9.13.0.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-250 | The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Dell PowerScale OneFS versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1. It involves execution with unnecessary privileges, meaning that a high privileged attacker who has local access to the system could exploit this flaw to elevate their privileges further.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a high privileged attacker with local access to gain elevated privileges beyond what they should have. This could lead to unauthorized access to sensitive data, modification of system configurations, or disruption of services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know