CVE-2021-36299

7.1 HIGH

📋 TL;DR

This SQL injection vulnerability in Dell iDRAC9 allows authenticated low-privilege users to execute arbitrary SQL commands. Attackers could potentially access sensitive information or cause denial of service. Organizations using affected iDRAC9 versions are at risk.

💻 Affected Systems

Products:
  • Dell iDRAC9
Versions: 4.40.00.00 and later, but prior to 4.40.29.00 and 5.00.00.00
Operating Systems: iDRAC9 firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with any privilege level, including low privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of iDRAC9 database leading to full system information disclosure, credential theft, and potential lateral movement to connected servers.

🟠

Likely Case

Information disclosure of iDRAC9 configuration data, user credentials, and system information, potentially enabling further attacks.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but low privilege users can exploit. SQL injection vulnerabilities are typically easy to weaponize once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.40.29.00 or 5.00.00.00

Vendor Advisory: https://support.emc.com/kb/000191229

Restart Required: Yes

Instructions:

1. Download the latest iDRAC9 firmware from Dell Support. 2. Log into iDRAC9 web interface. 3. Navigate to Maintenance > System Update. 4. Upload and install the firmware update. 5. Reboot the iDRAC9 system.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to iDRAC9 management interfaces to trusted networks only.

Privilege Reduction

all

Review and minimize user accounts with iDRAC9 access, especially low-privilege accounts.

🧯 If You Can't Patch

  • Implement strict network access controls to limit iDRAC9 access to essential personnel only.
  • Enable detailed logging and monitoring for SQL injection attempts and unusual database queries.

🔍 How to Verify

Check if Vulnerable:

Check iDRAC9 firmware version via web interface or SSH: racadm getversion

Check Version:

racadm getversion

Verify Fix Applied:

Verify firmware version is 4.40.29.00 or higher, or 5.00.00.00 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in iDRAC9 logs
  • Multiple failed authentication attempts followed by SQL-like payloads

Network Indicators:

  • SQL injection payloads in HTTP requests to iDRAC9 management interface

SIEM Query:

source="iDRAC9" AND (http_request CONTAINS "' OR '1'='1" OR http_request CONTAINS "UNION SELECT" OR http_request CONTAINS "SQL")

🔗 References

📤 Share & Export