CVE-2023-43069

7.8 HIGH

📋 TL;DR

Dell SmartFabric Storage Software v1.4 and earlier contain an OS command injection vulnerability in the CLI. An authenticated local attacker can inject malicious parameters into curl or docker commands, potentially executing arbitrary commands with elevated privileges. This affects all users running vulnerable versions of the software.

💻 Affected Systems

Products:
  • Dell SmartFabric Storage Software
Versions: v1.4 and earlier
Operating Systems: Linux-based OS running Dell SmartFabric Storage Software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local access to the CLI interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary command execution with root/admin privileges, allowing data theft, system destruction, or lateral movement.

🟠

Likely Case

Privilege escalation leading to unauthorized access to storage systems, configuration changes, or data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege access controls are implemented.

🌐 Internet-Facing: LOW (requires local authenticated access, not directly internet exploitable)
🏢 Internal Only: HIGH (authenticated internal users can exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.5 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download Dell SmartFabric Storage Software v1.5 or later from Dell support site. 2. Backup current configuration. 3. Apply the update following Dell's installation guide. 4. Restart the system as required.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit access to the CLI interface to only authorized administrators using strict access controls.

Network Segmentation

all

Isolate Dell SmartFabric Storage Software systems from general user networks.

🧯 If You Can't Patch

  • Implement strict least privilege access controls for all user accounts with CLI access.
  • Monitor CLI activity logs for suspicious command injection patterns and implement alerting.

🔍 How to Verify

Check if Vulnerable:

Check the software version via the CLI: 'smartfabric-storage --version' or check the web interface version information.

Check Version:

smartfabric-storage --version

Verify Fix Applied:

Verify version is v1.5 or later using the same version check command and ensure no command injection is possible in CLI parameters.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI commands containing shell metacharacters
  • Multiple failed command execution attempts
  • Unexpected curl or docker commands with suspicious parameters

Network Indicators:

  • Unusual outbound connections from storage systems
  • Command and control traffic patterns

SIEM Query:

source="dell_smartfabric" AND (command="curl" OR command="docker") AND (command CONTAINS "|" OR command CONTAINS ";" OR command CONTAINS "`" OR command CONTAINS "$")

🔗 References

📤 Share & Export