Cyber Posture

CVE-2026-25907

Medium

Published: 04 March 2026

Published
04 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score 0.0007 20.2th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25907 is a medium-severity Overly Restrictive Account Lockout Mechanism (CWE-645) vulnerability in Dell Powerscale Onefs. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
T1531 Account Access Removal Impact
Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.
Why these techniques?

Remote unauth vuln in account lockout mechanism directly enables exploitation of public-facing app (T1190) to trigger DoS via account lockouts (T1531) or app/system exploitation (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Dell PowerScale OneFS, version 9.13.0.0, contains an overly restrictive account lockout mechanism vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service.

Deeper analysisAI

CVE-2026-25907 is an overly restrictive account lockout mechanism vulnerability in Dell PowerScale OneFS version 9.13.0.0. This flaw, associated with CWE-645, allows an unauthenticated attacker with remote access to potentially trigger a denial of service condition. The vulnerability has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L), indicating medium severity with low availability impact but no confidentiality or integrity effects.

An unauthenticated attacker can exploit this vulnerability over the network with low complexity, requiring no privileges, user interaction, or special conditions. Successful exploitation leads to a denial of service, potentially disrupting access to the affected OneFS system by locking out accounts through repeated interactions with the lockout mechanism.

Dell's security advisory DSA-2026-095, detailed in KB article 000434591, provides a security update for Dell PowerScale OneFS addressing this overly restrictive account lockout mechanism vulnerability. Security practitioners should consult the advisory for patch deployment instructions and mitigation guidance.

Details

CWE(s)

Affected Products

dell
powerscale onefs
9.13.0.0

CVEs Like This One

CVE-2026-27102Same product: Dell Powerscale Onefs
CVE-2026-22279Same product: Dell Powerscale Onefs
CVE-2026-22278Same product: Dell Powerscale Onefs
CVE-2026-21425Same product: Dell Powerscale Onefs
CVE-2026-26944Same vendor: Dell
CVE-2026-22266Same vendor: Dell
CVE-2025-26336Same vendor: Dell
CVE-2025-43995Same vendor: Dell
CVE-2025-22475Same vendor: Dell
CVE-2025-43728Same vendor: Dell

References