CVE-2020-5368

9.8 CRITICAL

📋 TL;DR

Dell EMC VxRail versions 4.7.410 and 4.7.411 contain an improper authentication vulnerability that allows remote unauthenticated attackers to access sensitive information in encrypted form. This affects organizations using these specific VxRail appliance versions. The vulnerability stems from missing authentication mechanisms for certain functionality.

💻 Affected Systems

Products:
  • Dell EMC VxRail Appliance
Versions: 4.7.410 and 4.7.411 only
Operating Systems: VxRail OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only these two specific patch versions are affected. Earlier versions and later versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain encrypted sensitive data including credentials, configuration details, or proprietary information, potentially leading to full system compromise through decryption or further attacks.

🟠

Likely Case

Unauthenticated attackers accessing encrypted sensitive information that could be decrypted offline or used in subsequent attacks against the organization.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure of encrypted data only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows unauthenticated access to sensitive endpoints. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to VxRail version 4.7.412 or later

Vendor Advisory: https://www.dell.com/support/security/en-us/details/544058/DSA-2020-136-Dell-EMC-VxRail-Appliance-Improper-Authentication-Vulnerability

Restart Required: Yes

Instructions:

1. Download VxRail update package 4.7.412 or later from Dell support portal. 2. Follow VxRail upgrade procedures documented in Dell EMC VxRail documentation. 3. Apply the update through VxRail Manager. 4. Reboot the system as required by the update process.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to VxRail management interfaces to trusted networks only

Firewall Rules

all

Implement firewall rules to block external access to VxRail management ports

🧯 If You Can't Patch

  • Isolate VxRail appliances from untrusted networks and internet access
  • Implement strict network access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check VxRail version in VxRail Manager under System > About. If version is exactly 4.7.410 or 4.7.411, system is vulnerable.

Check Version:

From VxRail CLI: vxrail version or check in VxRail Manager web interface

Verify Fix Applied:

Verify version is 4.7.412 or later in VxRail Manager. Test that previously accessible unauthenticated endpoints now require proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to VxRail API endpoints
  • Access to sensitive endpoints without authentication logs

Network Indicators:

  • Unusual traffic patterns to VxRail management interfaces from untrusted sources

SIEM Query:

source="vxrail" AND (event_type="authentication_failure" OR http_status="200" AND http_method="GET" AND uri CONTAINS "/api/")

🔗 References

📤 Share & Export