CVE-2023-48667

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Dell PowerProtect DD's administrator CLI. A remote attacker with high privileges can execute arbitrary operating system commands on the underlying OS, potentially leading to complete system compromise. Affected systems are Dell PowerProtect DD appliances running vulnerable software versions.

💻 Affected Systems

Products:
  • Dell PowerProtect DD
Versions: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110
Operating Systems: DD OS (PowerProtect DD's proprietary operating system)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high privileged attacker access to administrator CLI. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with full administrative control, data exfiltration, ransomware deployment, or destruction of backup infrastructure.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive backup data, configuration manipulation, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, restricted administrative access, and proper monitoring detecting anomalous CLI activity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials but command injection vulnerabilities are typically straightforward to weaponize once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Dell Support. 2. Apply the update following Dell's PowerProtect DD firmware upgrade procedures. 3. Reboot the appliance as required by the update process.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit CLI access to only trusted administrative accounts and implement strict network access controls to the administrative interface.

Network Segmentation

all

Isolate PowerProtect DD appliances in dedicated network segments with strict firewall rules limiting inbound connections.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PowerProtect DD from untrusted networks
  • Enforce multi-factor authentication and least privilege access controls for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check the DD OS version via the CLI: 'version' command or web interface System > About

Check Version:

version

Verify Fix Applied:

Verify the version is at or above the patched versions: 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, or 6.2.1.110

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command patterns
  • Multiple failed authentication attempts followed by successful login
  • Execution of unexpected system commands

Network Indicators:

  • Unusual outbound connections from PowerProtect DD appliance
  • Anomalous traffic patterns to/from administrative interfaces

SIEM Query:

source="PowerProtect-DD" AND (event_type="cli_command" AND command="*;*" OR command="*|*" OR command="*`*")

🔗 References

📤 Share & Export