CVE-2023-24574

7.5 HIGH

📋 TL;DR

This vulnerability in Dell Enterprise SONiC OS allows unauthenticated remote attackers to cause denial of service by exploiting an uncontrolled resource consumption flaw in the authentication component. Attackers can create permanent home directories for unauthenticated users, potentially exhausting system resources. Affected systems include Dell Enterprise SONiC OS versions 3.5.3, 4.0.0, 4.0.1, and 4.0.2.

💻 Affected Systems

Products:
  • Dell Enterprise SONiC OS
Versions: 3.5.3, 4.0.0, 4.0.1, 4.0.2
Operating Systems: SONiC (Network Operating System)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system resource exhaustion leading to denial of service, rendering the network device unavailable and disrupting network operations.

🟠

Likely Case

Degraded system performance due to resource consumption, potentially causing intermittent service disruptions and increased latency.

🟢

If Mitigated

Minimal impact with proper monitoring and resource limits in place, though vulnerability still exists.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation means any internet-facing vulnerable device can be attacked without credentials.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access to the vulnerable device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests straightforward exploitation by creating directories, though specific exploit details aren't publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 4.0.2 (check vendor advisory for specific patched versions)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000208165/dsa-2023-039-dell-emc-enterprise-sonic-security-update-for-an-uncontrolled-resource-consumption-vulnerability

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2023-039. 2. Download and apply the appropriate patch for your SONiC version. 3. Reboot the device as required. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to SONiC management interfaces to trusted sources only

Resource Monitoring

linux

Implement monitoring for unusual disk space consumption or directory creation patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable SONiC devices from untrusted networks
  • Deploy rate limiting and monitoring for authentication attempts and directory creation activities

🔍 How to Verify

Check if Vulnerable:

Check SONiC OS version using 'show version' command and compare against affected versions (3.5.3, 4.0.0, 4.0.1, 4.0.2)

Check Version:

show version

Verify Fix Applied:

Verify SONiC OS version is updated to a patched version and check for any unusual directory creation in /home or similar directories

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts, unexpected directory creation in home directories, system resource exhaustion alerts

Network Indicators:

  • Multiple connection attempts to authentication services from single or distributed sources

SIEM Query:

source="sonic" AND (event_type="auth_failure" OR event_type="directory_create") | stats count by src_ip

🔗 References

📤 Share & Export