CVE-2022-24414

7.6 HIGH

📋 TL;DR

Dell EMC CloudLink versions 7.1.3 and earlier expose authentication tokens in GET request URLs, which can be logged by reverse proxies and servers. Attackers who obtain these tokens can potentially access the CloudLink server. This affects all deployments using vulnerable CloudLink versions.

💻 Affected Systems

Products:
  • Dell EMC CloudLink
Versions: 7.1.3 and all earlier versions
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using GET requests with authentication tokens are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to CloudLink server, allowing data theft, configuration changes, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to CloudLink management interface leading to data exposure and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper logging monitoring and network segmentation, though token exposure still presents credential leakage risk.

🌐 Internet-Facing: HIGH - Internet-facing instances allow attackers to potentially intercept tokens from logs or proxy caches.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still access tokens from internal logs and proxies.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining exposed tokens from logs or proxy caches, but token usage is straightforward once obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.4 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000197425/dsa-2022-064-dell-emc-cloudlink-security-update-for-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download CloudLink 7.1.4 or later from Dell support portal. 2. Backup current configuration. 3. Install the update following Dell's upgrade documentation. 4. Restart CloudLink services.

🔧 Temporary Workarounds

Configure reverse proxies to filter sensitive parameters

all

Configure reverse proxies to strip or mask authentication tokens from GET request logs

# Configuration depends on proxy software (nginx, Apache, etc.)

Implement POST-only authentication

all

Modify applications to use POST requests instead of GET for authentication endpoints

# Application-specific implementation required

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit CloudLink server exposure
  • Enable comprehensive logging and monitoring for unauthorized access attempts using stolen tokens

🔍 How to Verify

Check if Vulnerable:

Check CloudLink version via web interface or command line. Versions 7.1.3 and earlier are vulnerable.

Check Version:

cloudlink --version or check web interface administration panel

Verify Fix Applied:

Verify installation of CloudLink 7.1.4 or later and confirm authentication tokens are no longer transmitted via GET parameters.

📡 Detection & Monitoring

Log Indicators:

  • GET requests containing 'auth_token', 'token', or similar parameters in URL
  • Unauthorized access attempts from unexpected IP addresses

Network Indicators:

  • Authentication tokens visible in URL parameters of HTTP traffic
  • Unexpected authentication requests to CloudLink endpoints

SIEM Query:

source="cloudlink" AND (url="*token=*" OR url="*auth*=*")

🔗 References

📤 Share & Export