Dell PowerScale OneFS versions 8.2.0.x through 9.3.0.x, contain a weak password requirement vulnerability. An administrator may create an account with no password. A remote attacker may potentially exploit this leading to a user account compromise.
The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Powerscale_onefs | Dell | 9.0.0 (including) | 9.0.0 (including) |
Powerscale_onefs | Dell | 9.1.0 (including) | 9.1.0 (including) |
Powerscale_onefs | Dell | 9.1.1 (including) | 9.1.1 (including) |
Powerscale_onefs | Dell | 9.2.0 (including) | 9.2.0 (including) |
Powerscale_onefs | Dell | 9.2.1 (including) | 9.2.1 (including) |
Powerscale_onefs | Dell | 9.3.0 (including) | 9.3.0 (including) |
A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:
Depending on the threat model, the password policy may include several additional attributes.
See NIST 800-63B [REF-1053] for further information on password requirements.