CVE-2021-21524
📋 TL;DR
CVE-2021-21524 is a critical untrusted deserialization vulnerability in Dell SRM and SMR software that allows remote unauthenticated attackers to execute arbitrary privileged code. This affects organizations using Dell Storage Resource Manager or Storage Monitoring and Reporting versions before 4.5.0.1, potentially leading to complete system compromise.
💻 Affected Systems
- Dell EMC Storage Resource Manager (SRM)
- Dell EMC Storage Monitoring and Reporting (SMR)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with administrative privileges, data exfiltration, lateral movement within the network, and persistent backdoor installation.
Likely Case
Remote code execution leading to service disruption, data theft, and installation of malware or ransomware on affected systems.
If Mitigated
Limited impact if systems are isolated, patched, or have network controls preventing external access.
🎯 Exploit Status
CVSS 9.8 indicates trivial exploitation; unauthenticated remote attack vector makes weaponization highly likely.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.5.0.1
Restart Required: Yes
Instructions:
1. Download Dell SRM/SMR version 4.5.0.1 from Dell support portal. 2. Backup current configuration and data. 3. Install the update following Dell's installation guide. 4. Restart the application/services. 5. Verify successful update.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict network access to SRM/SMR management interfaces to trusted IPs only.
iptables -A INPUT -p tcp --dport [SRM_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [SRM_PORT] -j DROP
Windows Firewall Rules
windowsBlock external access to SRM/SMR ports using Windows Firewall.
New-NetFirewallRule -DisplayName "Block SRM External" -Direction Inbound -Protocol TCP -LocalPort [SRM_PORT] -Action Block
🧯 If You Can't Patch
- Isolate affected systems from internet and untrusted networks
- Implement strict network access controls and monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check installed version via SRM/SMR web interface or installation directory version files.
Check Version:
On Linux: cat /opt/dell/srm/version.txt or check Windows Program Files\Dell\SRM directory
Verify Fix Applied:
Verify version shows 4.5.0.1 or higher in application interface or version files.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from SRM/SMR services
- Deserialization errors in application logs
- Unexpected network connections from SRM/SMR hosts
Network Indicators:
- Exploit payload patterns in traffic to SRM/SMR ports
- Unusual outbound connections from SRM/SMR systems
SIEM Query:
source="SRM_logs" AND (event="DeserializationError" OR process="unusual_executable")
🔗 References
- https://www.dell.com/support/kbdoc/en-us/000184753/dsa-2021-054-dell-emc-srm-and-dell-emc-storage-monitoring-and-reporting-smr-security-update-for-multiple-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000184753/dsa-2021-054-dell-emc-srm-and-dell-emc-storage-monitoring-and-reporting-smr-security-update-for-multiple-vulnerabilities