CVE-2021-36298

8.1 HIGH

📋 TL;DR

Dell EMC InsightIQ versions before 4.1.4 use weak cryptographic algorithms in SSH, allowing unauthenticated attackers to bypass authentication and gain complete remote control. This affects all InsightIQ deployments running vulnerable versions, potentially compromising SSH services and system integrity.

💻 Affected Systems

Products:
  • Dell EMC InsightIQ
Versions: All versions prior to 4.1.4
Operating Systems: Not specified - InsightIQ is an appliance
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable due to the weak cryptographic algorithms in SSH.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover allowing attacker to access, modify, or delete data, disrupt services, and use the system as a foothold for lateral movement.

🟠

Likely Case

Unauthorized access to SSH services leading to data exposure, configuration changes, and potential service disruption.

🟢

If Mitigated

Limited impact if system is isolated, monitored, and has additional authentication layers, though vulnerability remains present.

🌐 Internet-Facing: HIGH - Directly exposed SSH services with weak cryptography can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Even internally, vulnerable SSH services can be exploited by attackers who gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation leverages known weaknesses in cryptographic algorithms, making it relatively straightforward for attackers with appropriate tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.4 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/000191604

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download InsightIQ 4.1.4 or later from Dell support. 3. Follow Dell's upgrade procedure for InsightIQ appliances. 4. Verify successful upgrade and SSH functionality.

🔧 Temporary Workarounds

Disable SSH Service

linux

Temporarily disable SSH access to prevent exploitation while planning upgrade.

systemctl stop sshd
systemctl disable sshd

Network Access Control

linux

Restrict SSH access to trusted IP addresses only using firewall rules.

iptables -A INPUT -p tcp --dport 22 -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

🧯 If You Can't Patch

  • Isolate the InsightIQ system from untrusted networks using firewall rules
  • Implement network monitoring and intrusion detection for SSH connection attempts

🔍 How to Verify

Check if Vulnerable:

Check InsightIQ version via web interface or SSH: version should be less than 4.1.4

Check Version:

ssh admin@insightiq_ip 'show version' or check web interface System Information

Verify Fix Applied:

Confirm version is 4.1.4 or later and test SSH connections with modern cryptographic algorithms

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH authentication attempts with unusual cryptographic algorithms
  • Successful SSH logins from unexpected sources

Network Indicators:

  • SSH traffic using weak cryptographic algorithms (e.g., CBC mode ciphers, MD5/SHA1 MACs)
  • SSH protocol negotiation showing vulnerable algorithms

SIEM Query:

source="insightiq" AND (event="ssh" OR port=22) AND (cipher="*cbc*" OR mac="*md5*" OR mac="*sha1*")

🔗 References

📤 Share & Export