{"vulnerability": "CVE-2025-27690", "sightings": [{"uuid": "371d4030-4da8-45b9-9774-a069fcf2d5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmglg5pcsk2w", "content": "", "creation_timestamp": "2025-04-10T03:40:19.834137Z"}, {"uuid": "e953e8f0-6758-4765-a705-c6844490ad5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmgn774vhn2h", "content": "", "creation_timestamp": "2025-04-10T04:12:14.363688Z"}, {"uuid": "a7ce6754-d1da-418d-a26b-bcd48eeb67e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114312092801164112", "content": "", "creation_timestamp": "2025-04-10T05:48:32.077424Z"}, {"uuid": "6c9175f6-9703-4243-966b-29b7da60b984", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114314020757340212", "content": "", "creation_timestamp": "2025-04-10T13:58:50.537070Z"}, {"uuid": "03a05c84-13bb-47ec-b19f-433f0187651e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmoz7shg5c2q", "content": "", "creation_timestamp": "2025-04-13T12:08:39.476182Z"}, {"uuid": "1ac47109-4132-4427-a70c-ffd9f6f57f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmoz7tljg22q", "content": "", "creation_timestamp": "2025-04-13T12:08:39.998734Z"}, {"uuid": "504add99-c918-46eb-8679-67ae29c33576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmoz7uuiws2q", "content": "", "creation_timestamp": "2025-04-13T12:08:40.524356Z"}, {"uuid": "e5327e73-46ce-4834-ba7f-b3db75b56102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11387", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27690\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.\n\ud83d\udccf Published: 2025-04-10T02:04:43.949Z\n\ud83d\udccf Modified: 2025-04-11T03:55:24.269Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-11T04:49:39.000000Z"}, {"uuid": "53ab7403-509e-4c86-9b16-1a96af53d98d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://t.me/cvedetector/22615", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27690 - Dell PowerScale OneFS Default Password Vulnerability (Remote Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2025-27690 \nPublished : April 10, 2025, 3:15 a.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T06:59:46.000000Z"}, {"uuid": "0d7c3a1e-12d9-40aa-8b7b-26b567fd7d3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114315653926253783", "content": "", "creation_timestamp": "2025-04-10T20:54:10.334119Z"}, {"uuid": "837095a4-45eb-4a1a-ba46-bf4b7d72361a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27690", "type": "seen", "source": "Telegram/q1v6fpd4crrHq44DB9Nj1uDJuUzOEqw5zlM7k7RhTjpY9VU", "content": "", "creation_timestamp": "2025-04-10T05:30:42.000000Z"}]}