CVE-2021-36302

9.9 CRITICAL

📋 TL;DR

This vulnerability allows a remote attacker with standard JEA (Just Enough Administration) credentials to escalate privileges and potentially take over Dell EMC Integrated System for Microsoft Azure Stack Hub. All versions of this system are affected. Attackers could gain full administrative control of the Azure Stack Hub environment.

💻 Affected Systems

Products:
  • Dell EMC Integrated System for Microsoft Azure Stack Hub
Versions: All versions
Operating Systems: Azure Stack Hub integrated system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires standard JEA credentials to exploit. Affects the integrated Dell EMC solution for Azure Stack Hub deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, allowing data theft, service disruption, and lateral movement within the Azure Stack Hub environment.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, configuration changes, and potential data exposure.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid JEA credentials but is described as potentially exploitable by remote malicious users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Dell Security Advisory DSA-2021-178 update

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000191165/dsa-2021-178-dell-emc-integrated-solution-for-microsoft-azure-stack-hub-security-update-for-a-just-enough-administration-jea-vulnerability

Restart Required: Yes

Instructions:

1. Review Dell Security Advisory DSA-2021-178. 2. Download the security update from Dell support. 3. Apply the update following Dell's deployment procedures. 4. Restart affected systems as required.

🔧 Temporary Workarounds

Restrict JEA Access

all

Limit standard JEA credential access to only trusted users and systems.

Network Segmentation

all

Isolate Azure Stack Hub management interfaces from untrusted networks.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all JEA credential usage
  • Segment the Azure Stack Hub management network and restrict remote access

🔍 How to Verify

Check if Vulnerable:

Check if your system is running Dell EMC Integrated System for Microsoft Azure Stack Hub without the DSA-2021-178 update applied.

Check Version:

Check Dell system management tools or Azure Stack Hub administrative interfaces for installed updates and version information.

Verify Fix Applied:

Verify the DSA-2021-178 security update has been successfully installed and systems have been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JEA credential usage patterns
  • Privilege escalation attempts in system logs
  • Unauthorized administrative actions

Network Indicators:

  • Suspicious connections to Azure Stack Hub management interfaces
  • Unexpected authentication attempts

SIEM Query:

Search for JEA authentication events followed by privilege escalation or administrative command execution within short timeframes.

🔗 References

📤 Share & Export