CVE-2021-36340

7.8 HIGH

📋 TL;DR

Dell EMC Secure Connect Gateway (SCG) versions 5.00.00.10 and earlier contain a sensitive information disclosure vulnerability. A local malicious user can exploit this to read sensitive information stored in the system, potentially including credentials or configuration data. This affects organizations using vulnerable versions of Dell EMC SCG.

💻 Affected Systems

Products:
  • Dell EMC Secure Connect Gateway
Versions: 5.00.00.10 and earlier
Operating Systems: Not specified - appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: This is an appliance-based system, so OS details are not typically specified by users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains access to administrative credentials, configuration secrets, or other sensitive data, leading to complete system compromise or lateral movement within the network.

🟠

Likely Case

Local user with malicious intent extracts sensitive configuration information that could be used for further attacks or reconnaissance.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure without escalation to full system compromise.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Internal malicious users or compromised accounts can exploit this vulnerability to access sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system but appears to be straightforward based on the CWE-532 (Insertion of Sensitive Information into Log File) classification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version newer than 5.00.00.10

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000193601/dsa-2021-245-dell-emc-secure-connect-gateway-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the latest SCG update from Dell support site. 2. Follow Dell's update procedures for SCG appliances. 3. Apply the update and restart the system as required.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and logical access to SCG appliances to authorized personnel only.

Enhanced monitoring

all

Implement strict monitoring of local access and file access patterns on SCG systems.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the SCG system locally
  • Monitor system logs for unusual access patterns or information disclosure attempts

🔍 How to Verify

Check if Vulnerable:

Check SCG version via web interface or CLI. If version is 5.00.00.10 or earlier, system is vulnerable.

Check Version:

Check via SCG web interface under System Information or use appliance-specific CLI commands

Verify Fix Applied:

After patching, verify version is newer than 5.00.00.10 and test that sensitive information is no longer accessible via the vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual local access patterns
  • Access to sensitive files or logs by unauthorized users
  • Failed attempts to access restricted system areas

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Search for local file access events on SCG systems, particularly access to configuration or log files containing sensitive data

🔗 References

📤 Share & Export