CVE-2020-5352

8.8 HIGH

📋 TL;DR

This vulnerability allows remote authenticated attackers to execute arbitrary operating system commands on Dell EMC Data Protection Advisor systems through OS command injection. Attackers with valid credentials can potentially gain full control of affected systems. Organizations running vulnerable versions of Data Protection Advisor are at risk.

💻 Affected Systems

Products:
  • Dell EMC Data Protection Advisor
Versions: 6.4, 6.5, 18.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. All default installations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to sensitive backup data, credential harvesting, and installation of cryptocurrency miners or other malware.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is technically simple once authenticated. Command injection vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.3, 18.1.2, or later

Vendor Advisory: https://www.dell.com/support/security/en-us/details/542719/DSA-2020-081-Dell-EMC-Data-Protection-Advisor-OS-Command-Injection-Vulnerability

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Dell's support site. 2. Backup your Data Protection Advisor configuration. 3. Apply the patch following Dell's installation guide. 4. Restart the Data Protection Advisor service. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Data Protection Advisor systems from the internet and restrict access to authorized management networks only.

Enhanced Authentication Controls

all

Implement multi-factor authentication and strong password policies for all Data Protection Advisor accounts.

🧯 If You Can't Patch

  • Implement strict network access controls to limit Data Protection Advisor access to trusted IP addresses only.
  • Enable detailed logging and monitoring for suspicious command execution patterns and failed authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Data Protection Advisor version in the web interface or via the installation directory. Versions 6.4, 6.5, and 18.1 are vulnerable unless patched.

Check Version:

On Windows: Check 'About' in Data Protection Advisor GUI. On Linux: Check /opt/emc/dpa/version.txt or similar installation directory.

Verify Fix Applied:

Verify the version is 6.5.3, 18.1.2, or later. Check Dell's advisory for specific patch verification steps.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Failed authentication attempts followed by successful logins
  • Suspicious process creation from Data Protection Advisor service

Network Indicators:

  • Unusual outbound connections from Data Protection Advisor server
  • Traffic to known malicious IPs or domains

SIEM Query:

source="Data Protection Advisor" AND (event_type="command_execution" OR event_type="authentication") | stats count by user, command

🔗 References

📤 Share & Export