CVE-2023-28055

8.8 HIGH

📋 TL;DR

Dell NetWorker 19.7 has an improper authorization vulnerability in its client component. An unauthenticated attacker on the same network can manipulate commands to gain complete server file access, leading to information disclosure, denial of service, or arbitrary code execution. Organizations using Dell NetWorker 19.7 are affected.

💻 Affected Systems

Products:
  • Dell NetWorker
Versions: Version 19.7
Operating Systems: All supported OS platforms for Dell NetWorker
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects NetWorker client component; requires attacker to be on same network segment as NetWorker client

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the NetWorker server allowing arbitrary code execution, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to backup data leading to information disclosure and potential denial of service by disrupting backup operations.

🟢

If Mitigated

Limited impact if network segmentation prevents attacker access to NetWorker client network segments.

🌐 Internet-Facing: LOW (requires same network access, not typically internet-facing)
🏢 Internal Only: HIGH (exploitable by any unauthenticated internal attacker on the same network)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows unauthenticated attackers on same network to manipulate commands without authorization

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Upgrade to version beyond 19.7 (check Dell advisory for specific fixed version)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000218003/dsa-2023-294-security-update-for-dell-networker-nw-client-vulnerabilities

Restart Required: Yes

Instructions:

1. Download latest NetWorker update from Dell support site. 2. Backup current configuration. 3. Apply update following Dell installation guide. 4. Restart NetWorker services.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate NetWorker clients to restricted network segments to prevent unauthorized access

Access Control Lists

all

Implement strict network ACLs to limit which systems can communicate with NetWorker clients

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate NetWorker clients from untrusted networks
  • Deploy host-based firewalls to restrict network access to NetWorker client ports

🔍 How to Verify

Check if Vulnerable:

Check NetWorker version: On Windows: Open NetWorker Management Console → Help → About. On Linux: Run 'nsr -v' command.

Check Version:

nsr -v (Linux) or check About in NetWorker Management Console (Windows)

Verify Fix Applied:

Verify version is updated beyond 19.7 and test client-server communication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to NetWorker client ports
  • Unusual command patterns in NetWorker logs
  • Failed authorization attempts

Network Indicators:

  • Unusual traffic patterns to NetWorker client ports (default 7937-9937)
  • Connection attempts from unauthorized IP addresses

SIEM Query:

source="NetWorker" AND (event_type="authentication_failure" OR command="*unauthorized*")

🔗 References

📤 Share & Export