CVE-2026-32803
Insufficient Logging in Dell PowerScale OneFS
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | powerscale_onefs | From 9.11.0.0 (inc) to 9.13.0.0 (exc) |
| dell | powerscale_onefs | From 9.5.0.0 (inc) to 9.5.1.7 (exc) |
| dell | powerscale_onefs | From 9.6.0.0 (inc) to 9.7.1.14 (exc) |
| dell | powerscale_onefs | From 9.8.0.0 (inc) to 9.10.1.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-778 | When a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Dell PowerScale OneFS versions 9.5.0.0 through 9.5.1.6, 9.6.0.0 through 9.7.1.13, 9.8.0.0 through 9.10.1.5, and 9.11.0.0 through 9.12.0.1. It is an Insufficient Logging vulnerability, meaning that the system does not adequately record certain actions or events.
A low privileged attacker who has local access to the system could exploit this vulnerability, potentially leading to information tampering.
How can this vulnerability impact me? :
Exploitation of this vulnerability could allow a low privileged local attacker to tamper with information on the affected Dell PowerScale OneFS systems.
Because the vulnerability involves insufficient logging, it may also hinder the ability to detect or investigate malicious activities effectively.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability is an Insufficient Logging issue in Dell PowerScale OneFS that could allow a low privileged local attacker to tamper with information.
Insufficient logging can impact compliance with standards such as GDPR and HIPAA, which require proper audit trails and monitoring to detect unauthorized access or changes to sensitive data.
Because this vulnerability could lead to information tampering without adequate logging, it may hinder an organization's ability to meet these regulatory requirements for accountability and traceability.