Dell Technologies has recently disclosed a significant security vulnerability impacting its widely deployed PowerScale OneFS storage solution, alerting organizations worldwide to update their file storage systems immediately.
This warning follows the discovery of several vulnerabilities—most notably, a critical flaw identified as CVE-2024-53298—which could allow even unauthenticated, remote attackers to access and manipulate the underlying filesystem.
For enterprises using PowerScale OneFS to manage large-scale file architectures, the exposure threatens the confidentiality, integrity, and availability of essential business data.
Understanding The Technical Risk: How Attackers Can Compromise Data
At the core of the vulnerability crisis is CVE-2024-53298, an authorization bypass in the NFS export component of PowerScale OneFS.
The flaw exists in OneFS versions 9.5.0.0 through 9.10.0.1 and arises from an improper or missing check on NFS exports.
With this weakness, hackers on the same network can craft malicious NFS requests, circumventing the platform’s intended security mechanisms.
Unlike many other vulnerabilities, the attack does not require any privileges or authentication—anyone with remote network access can potentially exploit it.
This particular vulnerability scores a critical 9.8 on the widely referenced Common Vulnerability Scoring System (CVSS), signifying its ease of exploitation and the severe consequences it carries.
If successfully leveraged, an attacker could read, modify, or delete arbitrary files stored on the system, essentially taking unauthorized control over sensitive and critical data.
This level of access, if attained, can pave the way for data breaches, ransomware attacks, or even the complete disruption of business operations.
The technical vector string associated with this risk makes it clear the attack is possible over the network, demands little effort or skill, requires no privileges, and user interaction is not needed, yet damages can be catastrophic for confidentiality, integrity, and availability.
Alongside CVE-2024-53298, Dell has also highlighted CVE-2025-32753, a SQL injection vulnerability affecting the same code base.
In this case, a low-privileged attacker with local access could manipulate database queries, risking the disclosure, tampering, or destruction of information, as well as possible denial of service conditions.
Combined, these flaws underscore the importance of swift mitigation, particularly for organizations operating in sensitive or regulated environments.
Immediate Steps For Mitigation And Long-Term Remediation
Dell has responded to these revelations by issuing updated and patched versions of OneFS software.
Affected users running any PowerScale OneFS version from 9.5.0.0 to 9.10.0.1 must upgrade to version 9.10.1.2 or later.
Organizations using the 9.7.x code line should move to version 9.7.1.8 or above, and those still on the oldest affected releases must update to at least version 9.5.1.3.
Beyond addressing CVE-2024-53298 and CVE-2025-32753, these updates also remedy vulnerabilities related to third-party components in FreeBSD and SupportAssist, making them vital for holistic security.
For IT teams unable to immediately upgrade, Dell suggests a temporary workaround for the critical NFS export flaw.
Administrators can reload each zone’s configured NFS exports using a specific command in the OneFS command line interface.
The code for this operation is as follows: isi nfs export reload –zone=zone_name.
This approach refreshes the NFS export configuration, ensuring access controls are re-applied without dropping existing client connections.
However, this mitigation only solves the current exposure for active sessions and does not provide ongoing protection from future exploitation.
Therefore, it is imperative to schedule and execute a full software update as soon as possible.
In addition to technical fixes, Dell urges all customers to consider moving to the latest Long-Term Support (LTS) code line, identified as the 9.10.x series, and to follow best practices for patch management and security monitoring.
Regularly updating storage solutions not only protects against these immediate threats but helps build resilience against the evolving landscape of cyberattacks.
With the stakes high and data at risk, organizations relying on PowerScale OneFS should heed this call to action to safeguard their most valuable digital assets.





