Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
- Last update: 06/06/2025
- Affected software: PowerScale OneFS versions 9.5.0.0 through 9.10.0.1
- Type:
→ Missing Authorization- CVE/CVSS:
→ CVE-2024-53298: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Successful exploitation of CVE-2024-53298 affecting various versions of PowerScale OneFS could allow
unauthenticated attackers to gain full access to the file system over the network.
CVE-2024-53298 has a significant impact on confidentiality, integrity, and availability.
There is no evidence that a public proof of concept exists. Currently, there is no evidence of active
exploitation.
The NFS service is incorrectly configured or contains a flaw whereby authorisation checks are not
enforced when a client attempts to access NFS exports. This indicates that the system does not validate
whether a requester has permission to access the shared filesystem.
By exploiting this vulnerability, a threat actor can:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing. Cisco has released software updates that address this vulnerability. There are no workarounds available.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.