CVE-2020-29495

10.0 CRITICAL

📋 TL;DR

CVE-2020-29495 is a critical OS command injection vulnerability in Dell EMC Avamar Server's Fitness Analyzer component. Remote unauthenticated attackers can execute arbitrary operating system commands with high privileges, potentially compromising both the application and underlying OS. Organizations running affected Avamar Server versions 19.1-19.3 are vulnerable.

💻 Affected Systems

Products:
  • Dell EMC Avamar Server
Versions: 19.1, 19.2, 19.3
Operating Systems: Linux (Avamar Server runs on Linux-based appliances)
Default Config Vulnerable: ⚠️ Yes
Notes: The Fitness Analyzer component is vulnerable. All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Avamar Server and underlying operating system, allowing attackers to steal backup data, deploy ransomware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to data exfiltration, installation of backdoors, and disruption of backup operations.

🟢

If Mitigated

Limited impact if network segmentation, strict firewall rules, and proper access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers on the internet to compromise vulnerable systems without any credentials.
🏢 Internal Only: HIGH - Even internally, any user with network access to the vulnerable service can exploit it without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and is in a web-accessible component, making exploitation straightforward for attackers who can reach the service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 19.3 (specific fixed version in vendor advisory)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000181806/dsa-2020-272-dell-emc-avamar-server-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the security update from Dell's support portal. 2. Apply the update following Dell's Avamar Server update procedures. 3. Restart the Avamar Server as required by the update process.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Avamar Server to only trusted management networks and backup clients.

Firewall Rules

all

Implement strict firewall rules to block external access to Avamar Server management interfaces.

🧯 If You Can't Patch

  • Isolate the Avamar Server on a dedicated VLAN with strict access controls
  • Implement network-based intrusion prevention systems (IPS) to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Avamar Server version via the Avamar Administration Console or CLI. If version is 19.1, 19.2, or 19.3, the system is vulnerable.

Check Version:

On Avamar Server: avmgr version

Verify Fix Applied:

Verify the Avamar Server version has been updated to a version beyond 19.3 as specified in Dell's security advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Unexpected processes spawned by Avamar services
  • Failed authentication attempts followed by successful command execution

Network Indicators:

  • Unusual outbound connections from Avamar Server
  • Suspicious HTTP requests to Fitness Analyzer endpoints

SIEM Query:

source="avamar_logs" AND (event="command_injection" OR process="unexpected_process")

🔗 References

📤 Share & Export