CVE-2021-21524

9.8 CRITICAL

📋 TL;DR

CVE-2021-21524 is a critical untrusted deserialization vulnerability in Dell SRM and SMR software that allows remote unauthenticated attackers to execute arbitrary privileged code. This affects organizations using Dell Storage Resource Manager or Storage Monitoring and Reporting versions before 4.5.0.1, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • Dell EMC Storage Resource Manager (SRM)
  • Dell EMC Storage Monitoring and Reporting (SMR)
Versions: All versions prior to 4.5.0.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both SRM and SMR products; vulnerability exists in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data exfiltration, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to service disruption, data theft, and installation of malware or ransomware on affected systems.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have network controls preventing external access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates trivial exploitation; unauthenticated remote attack vector makes weaponization highly likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.0.1

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000184753/dsa-2021-054-dell-emc-srm-and-dell-emc-storage-monitoring-and-reporting-smr-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download Dell SRM/SMR version 4.5.0.1 from Dell support portal. 2. Backup current configuration and data. 3. Install the update following Dell's installation guide. 4. Restart the application/services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to SRM/SMR management interfaces to trusted IPs only.

iptables -A INPUT -p tcp --dport [SRM_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [SRM_PORT] -j DROP

Windows Firewall Rules

windows

Block external access to SRM/SMR ports using Windows Firewall.

New-NetFirewallRule -DisplayName "Block SRM External" -Direction Inbound -Protocol TCP -LocalPort [SRM_PORT] -Action Block

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check installed version via SRM/SMR web interface or installation directory version files.

Check Version:

On Linux: cat /opt/dell/srm/version.txt or check Windows Program Files\Dell\SRM directory

Verify Fix Applied:

Verify version shows 4.5.0.1 or higher in application interface or version files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from SRM/SMR services
  • Deserialization errors in application logs
  • Unexpected network connections from SRM/SMR hosts

Network Indicators:

  • Exploit payload patterns in traffic to SRM/SMR ports
  • Unusual outbound connections from SRM/SMR systems

SIEM Query:

source="SRM_logs" AND (event="DeserializationError" OR process="unusual_executable")

🔗 References

📤 Share & Export