Dell Issues Critical Security Updates for PowerScale OneFS and Bluetooth Drivers

Thu 5th Jun, 2025

In a proactive move to enhance security and shield its devices from potential cyber threats, Dell has released crucial updates addressing vulnerabilities in its PowerScale OneFS operating system and Bluetooth drivers.

These updates come after the identification of critical vulnerabilities that could jeopardize both Dell's Network Attached Storage (NAS) systems and numerous PCs. The main concern lies with the PowerScale OneFS, which has been found to harbor a severe security flaw (CVE-2025-53298) that allows unauthorized remote access. This vulnerability could enable attackers to delete files on affected systems without requiring authentication.

The affected versions of PowerScale OneFS range from 9.5.0.0 to 9.10.0.1. To combat this risk, Dell has urged administrators to promptly install the security patches now available for download. Additionally, there are other vulnerabilities classified as medium-level threats, such as CVE-2025-32753, which could facilitate Denial of Service (DoS) attacks. The newer releases, specifically versions 9.5.1.3, 9.7.1.8, and 9.10.1.2, have been fortified against these issues.

In a related development, a significant flaw has been discovered in the Realtek Bluetooth driver affecting a wide array of Dell computers, including models from the Alienware and Inspiron series. This vulnerability (CVE-2024-11857) poses a high risk, allowing attackers with local access to delete files via symbolic links.

While the patched driver versions 2024.10.143.0 and 6001.15.156.200 are now available, it remains unclear whether any active exploits have been reported against these vulnerabilities. Administrators are advised to verify their systems against the identified threats to ensure robust security.

The release of these updates underscores Dell's commitment to maintaining the integrity and security of its products, especially in an era where cybersecurity threats are increasingly sophisticated. Users are encouraged to remain vigilant and apply the necessary updates without delay to mitigate potential risks.


More Quick Read Articles »