CVE-2023-4401

7.8 HIGH

📋 TL;DR

Dell SmartFabric Storage Software v1.4 and earlier contains an OS command injection vulnerability in the CLI's 'more' command. Authenticated attackers (local or remote) can exploit this to execute arbitrary commands with root privileges, potentially gaining full control of affected systems.

💻 Affected Systems

Products:
  • Dell SmartFabric Storage Software
Versions: v1.4 and earlier
Operating Systems: Linux-based appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with CLI access enabled. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root access, data theft, ransomware deployment, and lateral movement to other systems.

🟠

Likely Case

Privilege escalation to root leading to configuration changes, data access, and persistence mechanisms.

🟢

If Mitigated

Limited impact due to network segmentation and strict access controls preventing exploitation.

🌐 Internet-Facing: MEDIUM - Requires authentication but remote exploitation is possible if exposed.
🏢 Internal Only: HIGH - Authenticated users (including compromised accounts) can exploit from internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity once authentication is bypassed or obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.5 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the latest version from Dell Support. 2. Backup current configuration. 3. Apply the update following Dell's upgrade procedures. 4. Restart the system as required.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only trusted administrators and implement network segmentation.

Implement Least Privilege

all

Review and minimize user accounts with CLI access to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SmartFabric systems from untrusted networks.
  • Monitor and audit CLI access logs for suspicious activity and command injection attempts.

🔍 How to Verify

Check if Vulnerable:

Check software version via CLI: 'show version' or web interface. Versions 1.4 and earlier are vulnerable.

Check Version:

show version

Verify Fix Applied:

Verify version is 1.5 or later using 'show version' command or web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI commands, especially involving 'more' with unexpected parameters
  • Multiple failed authentication attempts followed by successful CLI access

Network Indicators:

  • Unexpected outbound connections from SmartFabric systems
  • Anomalous SSH/CLI traffic patterns

SIEM Query:

source="smartfabric_logs" AND (command="more*" OR command="*;*" OR command="*|*" OR command="*&*")

🔗 References

📤 Share & Export