CVE-2021-36287

7.3 HIGH

📋 TL;DR

Dell VNX2 file storage systems running version 8.1.21.266 or earlier contain an unauthenticated remote code execution vulnerability. Attackers can execute arbitrary commands on affected systems without authentication. This affects organizations using Dell VNX2 for file storage with vulnerable software versions.

💻 Affected Systems

Products:
  • Dell VNX2 for File
Versions: 8.1.21.266 and earlier
Operating Systems: VNX2 Control Station OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, access sensitive data, deploy ransomware, or pivot to other network systems.

🟠

Likely Case

Attackers gain unauthorized access to execute commands, potentially stealing data, disrupting operations, or installing backdoors for persistent access.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the isolated storage system with no lateral movement to critical assets.

🌐 Internet-Facing: HIGH - Unauthenticated RCE on internet-facing systems allows immediate compromise without any credentials.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems can exploit this, but requires some level of network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation with low complexity makes this highly attractive to attackers. While no public PoC is confirmed, similar vulnerabilities in storage systems often see rapid weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version later than 8.1.21.266

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000191155/dsa-2021-164-dell-vnx2-control-station-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the latest VNX2 Control Station update from Dell Support. 2. Apply the update following Dell's documented procedures. 3. Restart the Control Station as required. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate VNX2 systems from untrusted networks and restrict access to management interfaces.

Access Control Lists

all

Implement strict firewall rules to limit access to VNX2 management interfaces to authorized IP addresses only.

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network segmentation and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check the VNX2 Control Station software version via the management interface or CLI. If version is 8.1.21.266 or earlier, the system is vulnerable.

Check Version:

Check via VNX2 management interface or consult Dell documentation for version query commands specific to your deployment.

Verify Fix Applied:

After patching, verify the software version is later than 8.1.21.266 and test that unauthenticated command execution attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution events in system logs
  • Failed authentication attempts followed by successful command execution
  • Unexpected process creation or network connections

Network Indicators:

  • Unusual traffic to VNX2 management ports from unauthorized sources
  • Command injection patterns in HTTP requests to management interfaces

SIEM Query:

source="vnx2_logs" AND (event_type="command_execution" OR event_type="process_creation") AND user="unauthenticated"

🔗 References

📤 Share & Export