CVE-2022-32481

7.8 HIGH

📋 TL;DR

Dell PowerProtect Cyber Recovery versions before 19.11 contain a privilege escalation vulnerability where authenticated users with lower privileges can chain Docker commands to gain root access. This affects virtual appliance deployments, allowing attackers to take complete control of affected systems.

💻 Affected Systems

Products:
  • Dell PowerProtect Cyber Recovery
Versions: All versions prior to 19.11
Operating Systems: Linux-based virtual appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects virtual appliance deployments, not physical deployments. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root access, allowing data theft, ransomware deployment, or destruction of recovery capabilities.

🟠

Likely Case

Unauthorized administrative access leading to data exfiltration, configuration changes, or lateral movement within the environment.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of Docker command chaining techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.11 or later

Vendor Advisory: https://support.emc.com/kb/000201213

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install version 19.11 or later from Dell support portal. 3. Apply update following Dell documentation. 4. Restart the appliance.

🔧 Temporary Workarounds

Restrict Docker Access

linux

Limit Docker command execution to authorized administrators only

sudo usermod -aG docker <admin_users>
sudo chmod 750 /var/run/docker.sock

🧯 If You Can't Patch

  • Implement strict access controls and limit user permissions to essential functions only
  • Monitor Docker command execution and audit logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Cyber Recovery version via web interface or command line. Versions below 19.11 are vulnerable.

Check Version:

ssh admin@<appliance_ip> 'cat /etc/version' or check web admin interface

Verify Fix Applied:

Confirm version is 19.11 or later and test that non-admin users cannot execute privileged Docker commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Docker command execution by non-admin users
  • Privilege escalation attempts in system logs

Network Indicators:

  • Unexpected outbound connections from appliance
  • Unusual SSH or management traffic

SIEM Query:

source="cyber_recovery_logs" AND (docker_command_executed OR privilege_escalation_attempt)

🔗 References

📤 Share & Export