CVE-2022-46756

8.2 HIGH

📋 TL;DR

This vulnerability allows a local high-privileged attacker to escape container isolation and execute arbitrary operating system commands on the underlying host. It affects Dell VxRail hyperconverged infrastructure systems running versions prior to 7.0.410. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Dell VxRail
Versions: All versions prior to 7.0.410
Operating Systems: VxRail OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local high-privileged access within a container. Affects VxRail systems in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover where attacker gains full control of the underlying host OS, potentially compromising the entire VxRail cluster and all hosted workloads.

🟠

Likely Case

Privilege escalation from container to host OS, allowing attacker to execute arbitrary commands, access sensitive data, and pivot to other systems in the environment.

🟢

If Mitigated

Limited impact if proper access controls restrict local high-privileged users and container escape attempts are monitored and blocked.

🌐 Internet-Facing: LOW - This requires local high-privileged access, making direct internet exploitation unlikely without prior compromise.
🏢 Internal Only: HIGH - Internal attackers with local high-privileged access can exploit this to gain host-level control of critical infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local high-privileged access within a container. No public exploit code has been disclosed as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.410 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/000206943

Restart Required: Yes

Instructions:

1. Download VxRail 7.0.410 or later from Dell support portal. 2. Follow Dell's VxRail upgrade procedures. 3. Apply the update through VxRail Manager. 4. Reboot the system as required.

🔧 Temporary Workarounds

Restrict container privileges

all

Implement least privilege principles for container users and restrict capabilities to prevent container escape.

# Review and modify container security policies
# Use security contexts with minimal privileges
# Implement PodSecurityPolicies or equivalent

🧯 If You Can't Patch

  • Implement strict access controls to limit local high-privileged users on VxRail systems.
  • Monitor for container escape attempts using security tools and audit logs.

🔍 How to Verify

Check if Vulnerable:

Check VxRail version via VxRail Manager or CLI. If version is below 7.0.410, system is vulnerable.

Check Version:

vxrail version or check in VxRail Manager web interface

Verify Fix Applied:

Confirm VxRail version is 7.0.410 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual container-to-host process execution
  • Privilege escalation attempts from container context
  • Suspicious system command execution from container users

Network Indicators:

  • Unexpected outbound connections from VxRail management interfaces

SIEM Query:

source="vxrail" AND (event="container_escape" OR event="privilege_escalation" OR cmd="host_execution")

🔗 References

📤 Share & Export