First published: Tue Aug 10 2021(Updated: )
Dell EMC PowerScale OneFS versions 8.2.x - 9.2.1.x contain an OS command injection vulnerability. This may allow a user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE to escalate privileges and escape the compliance guarantees. This only impacts Smartlock WORM compliance mode clusters as a critical vulnerability and Dell recommends to update/upgrade at the earliest opportunity.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Isilon OneFS | >=9.0.0.0<=9.2.1 | |
Dell EMC Isilon OneFS | =8.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21599 is considered a critical vulnerability due to its potential for privilege escalation in compliance mode clusters.
To remediate CVE-2021-21599, update Dell EMC PowerScale OneFS to version 9.2.2 or later, or apply any available security patches.
CVE-2021-21599 affects Dell EMC PowerScale OneFS versions 8.2.x through 9.2.1.x.
Users with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE privileges on Smartlock WORM compliance mode clusters are at risk from CVE-2021-21599.
There are no documented workarounds for CVE-2021-21599, and it is recommended to apply the fix by upgrading to a secure version.