CVE-2022-24422

9.6 CRITICAL

📋 TL;DR

CVE-2022-24422 is an improper authentication vulnerability in Dell iDRAC9 that allows remote unauthenticated attackers to bypass authentication and gain access to the VNC Console. This affects organizations using Dell iDRAC9 versions 5.00.00.00 through 5.10.00.00 for server management.

💻 Affected Systems

Products:
  • Dell iDRAC9
Versions: 5.00.00.00 and later but prior to 5.10.10.00
Operating Systems: Not applicable - iDRAC is a dedicated management controller
Default Config Vulnerable: ⚠️ Yes
Notes: All iDRAC9 systems with affected firmware versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of server management interface leading to full administrative control over affected servers, potential data exfiltration, and server manipulation.

🟠

Likely Case

Unauthorized access to server console allowing attackers to execute commands, install malware, or disrupt server operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to iDRAC interfaces.

🌐 Internet-Facing: HIGH - iDRAC interfaces exposed to the internet can be directly exploited by any attacker without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to gain privileged access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated access, making exploitation straightforward for attackers who can reach the iDRAC interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.10.10.00 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000199267/dsa-2022-068-dell-idrac9-security-update-for-an-improper-authentication-vulnerability

Restart Required: Yes

Instructions:

1. Download iDRAC9 firmware 5.10.10.00 or later from Dell Support. 2. Log into iDRAC web interface. 3. Navigate to Maintenance > System Update. 4. Upload and install the firmware update. 5. Reboot the iDRAC controller when prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to iDRAC interfaces to trusted management networks only.

Disable VNC Console

all

Disable the VNC console feature in iDRAC settings if not required.

🧯 If You Can't Patch

  • Implement strict network access controls to isolate iDRAC interfaces from untrusted networks
  • Enable multi-factor authentication and strong password policies for iDRAC access

🔍 How to Verify

Check if Vulnerable:

Check iDRAC firmware version via web interface or SSH: racadm getversion

Check Version:

racadm getversion | grep -i firmware

Verify Fix Applied:

Verify firmware version is 5.10.10.00 or later using racadm getversion command

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated VNC connection attempts
  • Failed authentication followed by successful VNC access
  • Multiple authentication attempts from single IP

Network Indicators:

  • Unusual VNC traffic to iDRAC ports (5900, 5901)
  • Direct connections to iDRAC from external IPs

SIEM Query:

source="idrac" AND (event="VNC_CONNECT" AND user="anonymous") OR (auth_failure_count>0 AND subsequent_vnc_success=true)

🔗 References

📤 Share & Export