CVE-2020-5315

8.8 HIGH

📋 TL;DR

Dell EMC Repository Manager (DRM) version 3.2 stores proxy server passwords in plain text in a local database. This allows any authenticated local user with file system access to read these passwords and potentially impersonate the proxy user. Only DRM 3.2 installations with proxy configuration are affected.

💻 Affected Systems

Products:
  • Dell EMC Repository Manager (DRM)
Versions: Version 3.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if proxy server configuration is used; default installations without proxy are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious local user obtains proxy credentials, uses them to access external systems with the proxy user's privileges, potentially leading to data exfiltration, lateral movement, or further compromise.

🟠

Likely Case

Local user reads stored proxy password, uses it to authenticate to the proxy server, gaining unauthorized network access or performing actions as the proxy user.

🟢

If Mitigated

With proper access controls limiting local file system access to trusted administrators only, the exposure is contained to authorized personnel.

🌐 Internet-Facing: LOW - The vulnerability requires local file system access; direct internet exploitation is not possible.
🏢 Internal Only: HIGH - Any authenticated local user on the DRM host can potentially access the plain-text password database.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access to the file system where DRM stores its database; no special tools or skills needed beyond file reading.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: DRM version 3.2.1 or later

Vendor Advisory: https://www.dell.com/support/article/us/en/04/sln319925/dsa-2020-001-dell-emc-repository-manager-drm-sensitive-data-exposure-vulnerability?lang=en

Restart Required: Yes

Instructions:

1. Download DRM version 3.2.1 or later from Dell support site. 2. Install the update following Dell's installation guide. 3. Restart the DRM service or system as required.

🔧 Temporary Workarounds

Remove proxy configuration

all

If proxy is not required, remove the proxy server configuration from DRM to eliminate the stored password.

Open DRM GUI, navigate to Settings > Proxy, and clear proxy server details.

Restrict file system permissions

all

Limit access to the DRM database directory to only necessary administrative users.

Windows: icacls "C:\ProgramData\Dell\DRM\database" /deny Users:(R,W,X)
Linux: chmod 700 /opt/dell/drm/database

🧯 If You Can't Patch

  • Restrict local user access to the DRM host to trusted administrators only.
  • Monitor access to the DRM database files for unauthorized read attempts.

🔍 How to Verify

Check if Vulnerable:

Check DRM version via GUI (Help > About) or command line: 'drm --version' on Linux or check installed programs on Windows. If version is 3.2 and proxy is configured, it is vulnerable.

Check Version:

drm --version

Verify Fix Applied:

After updating, confirm version is 3.2.1 or later. Check that proxy passwords are no longer stored in plain text by inspecting the database file (if accessible) for encrypted or absent passwords.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access events to DRM database files by non-admin users
  • Failed authentication attempts to proxy server from unexpected sources

Network Indicators:

  • Proxy authentication from unexpected IP addresses or user accounts

SIEM Query:

source="windows_security" EventID=4663 ObjectName="*\Dell\DRM\database*" AND AccessMask=0x1

🔗 References

📤 Share & Export