CVE-2022-22554

8.2 HIGH

📋 TL;DR

Dell EMC System Update versions 1.9.2 and earlier store user credentials insecurely, allowing local attackers with user privileges to read passwords. This affects systems running vulnerable versions of the software, potentially exposing administrative credentials.

💻 Affected Systems

Products:
  • Dell EMC System Update
Versions: 1.9.2 and prior
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local user access; affects both client and server installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, leading to complete system compromise, data theft, or lateral movement across the network.

🟠

Likely Case

Local users escalate privileges or access sensitive systems using stolen credentials.

🟢

If Mitigated

Limited to credential exposure without successful exploitation due to access controls.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once credentials are accessed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.3 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/000195007

Restart Required: Yes

Instructions:

1. Download Dell EMC System Update version 1.9.3 or later from Dell's support site. 2. Run the installer as administrator. 3. Follow on-screen prompts to complete installation. 4. Restart the system.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local user access to systems running vulnerable versions.

Monitor Credential Storage

all

Audit and secure files where credentials might be stored.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges.
  • Monitor for unusual credential access or privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check Dell EMC System Update version via GUI or command line; versions 1.9.2 or earlier are vulnerable.

Check Version:

On Windows: 'dsu-cli.exe --version' or check in GUI. On Linux: 'dsu --version'.

Verify Fix Applied:

Confirm version is 1.9.3 or later and test credential storage security.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to credential storage files
  • Failed login attempts with exposed credentials

Network Indicators:

  • Unusual outbound connections post-exploitation

SIEM Query:

Event logs showing local user accessing sensitive files or privilege escalation.

🔗 References

📤 Share & Export