CVE-2023-28079

7.0 HIGH

📋 TL;DR

CVE-2023-28079 is an insecure file and folder permissions vulnerability in Dell PowerPath for Windows that allows non-admin users to escalate privileges to SYSTEM level and execute arbitrary code. This affects PowerPath for Windows versions 7.0, 7.1, and 7.2. Any Windows system running these vulnerable PowerPath versions is at risk.

💻 Affected Systems

Products:
  • Dell PowerPath for Windows
Versions: 7.0, 7.1, 7.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PowerPath for Windows installations. Linux versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install persistent malware, steal credentials, disable security controls, and pivot to other systems.

🟠

Likely Case

Local privilege escalation leading to lateral movement within the network, data exfiltration, and installation of ransomware or other malicious payloads.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, though the vulnerability still provides a foothold for attackers.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any compromised user account on affected systems can escalate to SYSTEM privileges, making this dangerous for internal network security.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but is straightforward once access is obtained due to weak permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to PowerPath for Windows version 7.3 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000214248/dsa-2023-154-powerpath-windows-security-update-for-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the latest PowerPath for Windows version from Dell Support. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict PowerPath folder permissions

windows

Manually adjust file and folder permissions for PowerPath installation directories to restrict write access to administrators only.

icacls "C:\Program Files\EMC\PowerPath" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"
icacls "C:\ProgramData\EMC\PowerPath" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized privilege escalation attempts
  • Isolate affected systems from critical network segments and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check PowerPath version via Control Panel > Programs and Features or using 'ppadm version' command in PowerShell/CMD

Check Version:

ppadm version

Verify Fix Applied:

Verify PowerPath version is 7.3 or later and check folder permissions for PowerPath directories using 'icacls' command

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 (process creation) showing unusual processes running as SYSTEM from PowerPath directories
  • Event ID 4672 (special privileges assigned) for non-admin users

Network Indicators:

  • Unusual outbound connections from systems running PowerPath
  • Lateral movement attempts from PowerPath systems

SIEM Query:

source="Windows Security" EventID=4688 OR EventID=4672 | where ProcessPath contains "PowerPath" OR SubjectUserName not in ("SYSTEM", "Administrator")

🔗 References

📤 Share & Export