CVE-2026-25907
Published: 04 March 2026
Summary
CVE-2026-25907 is a medium-severity Overly Restrictive Account Lockout Mechanism (CWE-645) vulnerability in Dell Powerscale Onefs. Its CVSS base score is 5.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauth vuln in account lockout mechanism directly enables exploitation of public-facing app (T1190) to trigger DoS via account lockouts (T1531) or app/system exploitation (T1499.004).
NVD Description
Dell PowerScale OneFS, version 9.13.0.0, contains an overly restrictive account lockout mechanism vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service.
Deeper analysisAI
CVE-2026-25907 is an overly restrictive account lockout mechanism vulnerability in Dell PowerScale OneFS version 9.13.0.0. This flaw, associated with CWE-645, allows an unauthenticated attacker with remote access to potentially trigger a denial of service condition. The vulnerability has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L), indicating medium severity with low availability impact but no confidentiality or integrity effects.
An unauthenticated attacker can exploit this vulnerability over the network with low complexity, requiring no privileges, user interaction, or special conditions. Successful exploitation leads to a denial of service, potentially disrupting access to the affected OneFS system by locking out accounts through repeated interactions with the lockout mechanism.
Dell's security advisory DSA-2026-095, detailed in KB article 000434591, provides a security update for Dell PowerScale OneFS addressing this overly restrictive account lockout mechanism vulnerability. Security practitioners should consult the advisory for patch deployment instructions and mitigation guidance.
Details
- CWE(s)