CVE-2021-21585

9.1 CRITICAL

📋 TL;DR

CVE-2021-21585 is an OS command injection vulnerability in Dell OpenManage Enterprise's RACADM and IPMI tools. Remote authenticated users with high privileges can execute arbitrary operating system commands on affected systems. This affects Dell OpenManage Enterprise versions before 3.6.1.

💻 Affected Systems

Products:
  • Dell OpenManage Enterprise
Versions: All versions prior to 3.6.1
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with high privileges. RACADM and IPMI tools must be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands with root privileges, potentially leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Privileged authenticated attackers gaining remote code execution on OpenManage Enterprise servers, enabling them to modify configurations, steal credentials, or deploy malware.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation even if vulnerable.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with high privileges. Command injection vulnerabilities are commonly exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.1

Vendor Advisory: https://www.dell.com/support/kbdoc/000189673

Restart Required: Yes

Instructions:

1. Download OpenManage Enterprise version 3.6.1 or later from Dell Support. 2. Backup current configuration. 3. Apply the update through the OpenManage Enterprise web interface. 4. Restart the OpenManage Enterprise service or server as required.

🔧 Temporary Workarounds

Restrict Access to OpenManage Enterprise

all

Limit network access to OpenManage Enterprise management interface to trusted IP addresses only.

Configure firewall rules to restrict access to OpenManage Enterprise ports (typically 443, 1311)

Reduce Privileged Accounts

all

Minimize number of users with high privileges in OpenManage Enterprise and implement least privilege access.

Review and remove unnecessary administrative accounts from OpenManage Enterprise

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpenManage Enterprise servers from critical systems
  • Enable detailed logging and monitoring for command execution attempts and privilege escalation

🔍 How to Verify

Check if Vulnerable:

Check OpenManage Enterprise version in web interface under Help > About. If version is below 3.6.1, system is vulnerable.

Check Version:

In OpenManage Enterprise web interface: Navigate to Help > About to view version

Verify Fix Applied:

Verify version is 3.6.1 or higher in Help > About. Test RACADM and IPMI functionality to ensure they work without allowing command injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login
  • Suspicious process creation from OpenManage Enterprise services

Network Indicators:

  • Unusual outbound connections from OpenManage Enterprise server
  • Traffic patterns indicating command and control activity

SIEM Query:

source="OpenManage" AND (event_type="command_execution" OR process_name="cmd.exe" OR process_name="bash")

🔗 References

📤 Share & Export