CVE-2021-21601

8.8 HIGH

📋 TL;DR

Dell EMC Data Protection Search and IDPA contain an information exposure vulnerability where sensitive user credentials are logged in plain text. A local low-privileged attacker could read these logs to obtain credentials and potentially access the application with compromised account privileges. This affects Dell EMC Data Protection Search versions 19.4 and prior, and IDPA versions 2.6.1 and prior.

💻 Affected Systems

Products:
  • Dell EMC Data Protection Search
  • Dell EMC Integrated Data Protection Appliance (IDPA)
Versions: Data Protection Search: 19.4 and prior; IDPA: 2.6.1 and prior
Operating Systems: Not specified - likely appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the CIS (Cloud Infrastructure Services) component. Requires local access to the system where logs are stored.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative credentials from logs, leading to complete compromise of the Data Protection Search/IDPA system, potential data exfiltration, and lateral movement within the environment.

🟠

Likely Case

A local low-privileged user extracts credentials for other users, elevates privileges within the application, and accesses sensitive backup/search data they shouldn't have permission to view.

🟢

If Mitigated

With proper log file permissions and monitoring, unauthorized access to logs is prevented, limiting exposure to authorized administrators only.

🌐 Internet-Facing: LOW - This requires local access to the system, so internet-facing systems are not directly vulnerable unless combined with another vulnerability.
🏢 Internal Only: HIGH - Any local user (including compromised accounts or malicious insiders) can potentially access the logs and extract credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to read log files. No special tools or complex techniques needed - just file read access to the vulnerable log location.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Data Protection Search: 19.5 or later; IDPA: 2.7 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/000189555

Restart Required: Yes

Instructions:

1. Download the appropriate update from Dell Support. 2. Backup current configuration. 3. Apply the patch following Dell's update procedures. 4. Restart the affected services or appliance as required.

🔧 Temporary Workarounds

Restrict log file permissions

linux

Set strict file permissions on log directories to prevent unauthorized users from reading sensitive log files

chmod 600 /path/to/vulnerable/logs/*
chown root:root /path/to/vulnerable/logs/*

Enable log file encryption

all

Configure log file encryption if supported by the application to protect sensitive data at rest

🧯 If You Can't Patch

  • Implement strict access controls on log directories - only allow authorized administrators to read log files
  • Regularly monitor and audit access to log files for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check version: For Data Protection Search, verify version is 19.4 or earlier. For IDPA, verify version is 2.6.1 or earlier. Also check if sensitive credentials appear in plain text in CIS component logs.

Check Version:

Check application web interface or administrative console for version information, or consult Dell documentation for version checking commands specific to each product.

Verify Fix Applied:

Verify installation of Data Protection Search 19.5+ or IDPA 2.7+. Check that credentials no longer appear in plain text in log files after patch application.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to log directories
  • Multiple failed login attempts followed by successful login with previously unused credentials
  • User account activity from unexpected locations or times

Network Indicators:

  • Unusual data exfiltration patterns from the Data Protection Search/IDPA system

SIEM Query:

source="dell-dps-logs" AND (event_type="file_access" AND file_path="*log*" AND user!="authorized_admin") OR (authentication.success AND user="previously_compromised_account")

🔗 References

📤 Share & Export