CVE-2025-43935
Improper Resource Release in Dell PowerScale OneFS Causes DoS
Publication date: 2026-04-16
Last updated on: 2026-04-21
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | powerscale_onefs | From 9.11.0.0 (inc) to 9.12.0.0 (exc) |
| dell | powerscale_onefs | to 9.5.1.5 (exc) |
| dell | powerscale_onefs | From 9.6.0.0 (inc) to 9.7.1.10 (exc) |
| dell | powerscale_onefs | From 9.8.0.0 (inc) to 9.10.1.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-404 | The product does not release or incorrectly releases a resource before it is made available for re-use. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Dell PowerScale OneFS allows a high privileged local attacker to cause a denial of service by improper resource shutdown or release.
Since the vulnerability leads to denial of service without impacting confidentiality or integrity of data, it may not directly violate data protection requirements under standards like GDPR or HIPAA.
However, denial of service could affect availability requirements, which are part of many compliance frameworks.
Therefore, organizations relying on affected versions might face challenges in maintaining availability controls required by such regulations.
Can you explain this vulnerability to me?
This vulnerability exists in Dell PowerScale OneFS versions prior to 9.12.0.0 and involves improper resource shutdown or release. It can be exploited by a highly privileged attacker who has local access to the system.
Exploiting this vulnerability could lead to a denial of service condition.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause a denial of service, which means the affected system or service could become unavailable or stop functioning properly.