CVE-2023-44285

7.8 HIGH

📋 TL;DR

This vulnerability allows a local malicious user with low privileges on Dell PowerProtect DD systems to escalate their privileges, potentially gaining unauthorized access or control. It affects Dell PowerProtect DD backup appliances running vulnerable software versions. The issue stems from improper access control mechanisms in the software.

💻 Affected Systems

Products:
  • Dell PowerProtect DD
Versions: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110
Operating Systems: Dell PowerProtect DD OS
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the PowerProtect DD backup appliance software specifically. The vulnerability requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A local low-privilege user gains full administrative control over the PowerProtect DD appliance, allowing them to access, modify, or delete backup data, disrupt backup operations, or use the system as a pivot point to attack other systems.

🟠

Likely Case

A malicious insider or compromised low-privilege account escalates to administrative privileges, enabling unauthorized access to sensitive backup data and system configuration.

🟢

If Mitigated

With proper access controls, monitoring, and network segmentation, impact is limited to the specific compromised appliance, though backup data confidentiality and integrity remain at risk.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access with low privileges. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Dell Support. 2. Apply the patch following Dell's PowerProtect DD update procedures. 3. Restart the appliance as required by the update process.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local console and SSH access to only trusted administrative users.

Configure access controls via PowerProtect DD administration interface

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local access to the PowerProtect DD appliance.
  • Monitor authentication logs and user privilege changes for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check the PowerProtect DD software version via the administration interface or CLI.

Check Version:

From PowerProtect DD CLI: version

Verify Fix Applied:

Verify the software version is 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized user account modifications
  • Access to administrative functions by non-admin users

Network Indicators:

  • Unusual authentication patterns to the PowerProtect DD management interface

SIEM Query:

source="PowerProtect DD" AND (event_type="privilege_escalation" OR user_change="admin")

🔗 References

📤 Share & Export