CVE-2021-21502 exposes Dell PowerScale OneFS 8.1.0 – 9.1.0 to continued access after account expiration. Learn the impact, technical details, and mitigation steps.
Dell PowerScale OneFS versions 8.1.0 – 9.1.0 contain a vulnerability that allows the use of SSH keys past account expiration. Users with specific network privileges and expired accounts could exploit this, resulting in continued access even after account expiration.
Understanding CVE-2021-21502
This CVE, published on February 8, 2021, affects Dell PowerScale OneFS versions 8.1.0 – 9.1.0 due to a critical vulnerability related to SSH key usage.
What is CVE-2021-21502?
CVE-2021-21502 highlights a security flaw in Dell PowerScale OneFS versions, where users with the ISI_PRIV_AUTH_SSH RBAC privilege can retain access post account expiration, posing a significant risk to the system.
The Impact of CVE-2021-21502
The impact of this vulnerability is classified as critical with a CVSS base score of 9.8, indicating high confidentiality, integrity, and availability impacts. Exploitation of this vulnerability could lead to unauthorized access to critical system resources.
Technical Details of CVE-2021-21502
The technical details of CVE-2021-21502 include a low attack complexity with network-based attack vectors. The vulnerability requires no privileges and has a high severity level, emphasizing the importance of an immediate update.
Vulnerability Description
The vulnerability allows users with specific privileges and expired accounts to continue accessing the system, bypassing normal security measures.
Affected Systems and Versions
Dell PowerScale OneFS versions 8.1.0 – 9.1.0 are confirmed to be affected by this vulnerability.
Exploitation Mechanism
Users with the ISI_PRIV_AUTH_SSH RBAC privilege and expired accounts can exploit this vulnerability to maintain access post account expiration.
Mitigation and Prevention
To mitigate the risks associated with CVE-2021-21502, users are advised to take immediate steps and implement long-term security practices along with regular patching and updates.
Immediate Steps to Take
It is recommended to upgrade Dell PowerScale OneFS to versions that address this vulnerability as soon as possible.
Long-Term Security Practices
Implement strong access controls, monitor privileged accounts, and regularly review and update security policies to prevent unauthorized access.
Patching and Updates
Stay informed about security updates provided by Dell and promptly install patches to mitigate the risks posed by CVE-2021-21502.