CVE-2021-36328

8.8 HIGH

📋 TL;DR

CVE-2021-36328 is a SQL injection vulnerability in Dell EMC Streaming Data Platform that allows remote attackers to execute arbitrary SQL commands. This can lead to unauthorized data access, modification, or deletion from the database. Organizations running affected versions of Dell EMC Streaming Data Platform are vulnerable.

💻 Affected Systems

Products:
  • Dell EMC Streaming Data Platform
Versions: All versions before 1.3
Operating Systems: Not OS-specific - application vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, data destruction, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive data stored in the database, potentially including credentials, configuration data, and streaming data.

🟢

If Mitigated

Limited impact with proper network segmentation and database access controls in place.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.3 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-in/000193697/dsa-2021-205-dell-emc-streaming-data-platform-security-update-for-third-party-vulnerabilities

Restart Required: Yes

Instructions:

1. Backup all data and configurations. 2. Download Dell EMC Streaming Data Platform version 1.3 or later. 3. Follow Dell's upgrade documentation to apply the update. 4. Restart the Streaming Data Platform services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Streaming Data Platform to only trusted sources.

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules to block exploitation attempts.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the vulnerable system.
  • Monitor database logs for unusual SQL query patterns and implement database-level access restrictions.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Dell EMC Streaming Data Platform. If version is below 1.3, the system is vulnerable.

Check Version:

Check the platform administration interface or configuration files for version information.

Verify Fix Applied:

Confirm the system is running version 1.3 or later and test SQL injection attempts are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts followed by SQL errors
  • Unexpected database schema changes

Network Indicators:

  • HTTP requests containing SQL syntax in parameters
  • Unusual database connection patterns from application servers

SIEM Query:

source="database_logs" AND ("sql injection" OR "unexpected query" OR "syntax error")

🔗 References

📤 Share & Export