Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
emc_powerscale_onefs Vendor: dell

About This Product

emc_powerscale_onefs is a software product offered by dell. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 84 known vulnerabilities affecting dell emc_powerscale_onefs. This includes 2 critical-severity issues and 40 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2016 to 2023, indicating a sustained research interest and ongoing security attention. 39 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2015-6312 2016-04-06 2025-04-12 7.5 7.8 Likely
CVE-2016-1346 2016-04-06 2025-04-12 5.9 7.1 Likely
CVE-2020-5371 2020-07-06 2024-11-21 8.0 6.5 Likely
CVE-2020-5383 2020-08-27 2024-11-21 5.3 5.0 Likely
CVE-2020-5369 2020-09-02 2024-11-21 8.8 6.5 Likely
CVE-2020-26181 2021-01-05 2024-11-21 7.0 7.2 Unknown
CVE-2020-26191 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-26192 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-26193 2021-02-09 2024-11-21 7.8 7.2 Unknown
CVE-2020-26194 2021-02-09 2024-11-21 7.0 4.6 Unknown
CVE-2020-26195 2021-02-09 2024-11-21 5.3 5.0 Likely
CVE-2020-26196 2021-02-09 2024-11-21 5.5 2.1 Unknown
CVE-2021-21502 2021-02-09 2024-11-21 9.8 7.5 Likely
CVE-2021-21503 2021-03-08 2024-11-21 7.8 4.6 Unknown
CVE-2021-21506 2021-03-08 2024-11-21 8.8 6.5 Likely
CVE-2020-26197 2021-04-20 2024-11-21 7.5 6.4 Likely
CVE-2021-21527 2021-05-06 2024-11-21 6.0 7.2 Unknown
CVE-2021-21550 2021-05-06 2024-11-21 6.0 7.2 Unknown
CVE-2020-26180 2021-07-28 2024-11-21 6.3 6.5 Likely
CVE-2020-5353 2021-07-29 2024-11-21 8.8 9.0 Likely
CVE-2021-21562 2021-08-03 2024-11-21 4.4 2.1 Unknown
CVE-2021-21563 2021-08-03 2024-11-21 6.5 4.0 Likely
CVE-2021-21568 2021-08-16 2024-11-21 4.3 4.0 Likely
CVE-2021-21592 2021-08-16 2024-11-21 3.1 4.0 Likely
CVE-2021-21594 2021-08-16 2024-11-21 8.2 5.0 Likely
CVE-2021-21595 2021-08-16 2024-11-21 6.0 4.6 Unknown
CVE-2021-21599 2021-08-16 2024-11-21 6.0 4.6 Unknown
CVE-2021-36278 2021-08-16 2024-11-21 8.1 2.1 Unknown
CVE-2021-36279 2021-08-16 2024-11-21 7.8 7.2 Unknown
CVE-2021-36280 2021-08-16 2024-11-21 7.8 2.1 Unknown
CVE-2021-36281 2021-08-16 2024-11-21 7.5 6.5 Likely
CVE-2021-36282 2021-08-16 2024-11-21 2.5 2.1 Unknown
CVE-2021-21528 2021-11-12 2024-11-21 7.5 5.0 Likely
CVE-2021-36305 2021-11-12 2024-11-21 6.5 4.0 Likely
CVE-2021-21561 2021-11-23 2024-11-21 7.8 2.1 Unknown
CVE-2022-22563 2022-04-08 2024-11-21 4.4 2.1 Unknown
CVE-2022-24428 2022-04-08 2024-11-21 6.3 6.5 Likely
CVE-2022-26851 2022-04-08 2024-11-21 9.1 6.4 Likely
CVE-2022-26852 2022-04-08 2024-11-21 8.1 7.5 Likely
CVE-2022-26854 2022-04-08 2024-11-21 8.1 10.0 Likely
CVE-2022-26855 2022-04-08 2024-11-21 5.5 2.1 Unknown
CVE-2022-22549 2022-04-12 2024-11-21 7.5 6.8 Likely
CVE-2022-22550 2022-04-12 2024-11-21 6.7 4.6 Unknown
CVE-2022-22559 2022-04-12 2024-11-21 7.5 5.0 Likely
CVE-2022-22560 2022-04-12 2024-11-21 7.1 4.9 Unknown
CVE-2022-22561 2022-04-12 2024-11-21 8.1 7.5 Likely
CVE-2022-22562 2022-04-12 2024-11-21 7.5 5.0 Likely
CVE-2022-22565 2022-04-12 2024-11-21 4.7 5.5 Likely
CVE-2022-23159 2022-04-12 2024-11-21 4.8 4.0 Likely
CVE-2022-23160 2022-04-12 2024-11-21 5.4 4.0 Likely
CVE-2022-23161 2022-04-12 2024-11-21 7.5 5.0 Likely
CVE-2022-23163 2022-04-12 2024-11-21 4.7 2.1 Unknown
CVE-2022-24411 2022-04-12 2024-11-21 7.8 4.6 Unknown
CVE-2022-24412 2022-04-12 2024-11-21 7.5 5.0 Likely
CVE-2022-24413 2022-04-12 2024-11-21 4.4 3.3 Unknown
CVE-2022-31237 2022-08-22 2024-11-21 3.3 - -
CVE-2022-31238 2022-08-22 2024-11-21 4.7 - -
CVE-2022-32480 2022-08-22 2024-11-21 4.3 - -
CVE-2022-33932 2022-08-22 2024-11-21 5.3 - -
CVE-2022-34369 2022-09-02 2024-11-21 8.1 - -
CVE-2022-34371 2022-09-02 2024-11-21 8.1 - -
CVE-2022-34378 2022-09-02 2024-11-21 5.5 - -
CVE-2022-31239 2022-10-21 2024-11-21 6.7 - -
CVE-2022-34437 2022-10-21 2024-11-21 6.7 - -
CVE-2022-34438 2022-10-21 2025-05-07 6.7 - -
CVE-2022-34439 2022-10-21 2024-11-21 5.3 - -
CVE-2022-45095 2023-02-01 2024-11-21 6.7 - -
CVE-2022-45096 2023-02-01 2024-11-21 5.4 - -
CVE-2022-45097 2023-02-01 2024-11-21 6.3 - -
CVE-2022-45101 2023-02-01 2024-11-21 7.3 - -
CVE-2022-45098 2023-02-01 2024-11-21 6.1 - -
CVE-2022-45099 2023-02-01 2024-11-21 7.8 - -
CVE-2022-45100 2023-02-01 2024-11-21 8.1 - -
CVE-2022-46679 2023-02-01 2024-11-21 6.5 - -
CVE-2023-22572 2023-02-01 2024-11-21 7.8 - -
CVE-2023-22573 2023-02-01 2024-11-21 7.9 - -
CVE-2023-22574 2023-02-01 2024-11-21 8.1 - -
CVE-2023-22575 2023-02-01 2024-11-21 8.7 - -
CVE-2022-34454 2023-02-10 2024-11-21 6.7 - -
CVE-2022-33934 2023-02-10 2024-11-21 7.7 - -
CVE-2023-25540 2023-02-28 2024-11-21 6.0 - -
CVE-2023-25940 2023-04-04 2024-11-21 6.7 - -
CVE-2023-25941 2023-04-04 2024-11-21 7.8 - -
CVE-2023-25942 2023-04-04 2024-11-21 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for dell emc_powerscale_onefs by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.