CVE-2024-0161

7.2 HIGH

📋 TL;DR

This vulnerability allows a local low-privileged attacker on affected Dell PowerEdge and Precision Rack servers to perform arbitrary writes to SMRAM (System Management RAM) due to improper buffer verification in SMM (System Management Mode) communication. This could lead to privilege escalation and system compromise. Only users with local access to vulnerable Dell servers are affected.

💻 Affected Systems

Products:
  • Dell PowerEdge Servers
  • Dell Precision Rack Workstations
Versions: Specific BIOS versions as listed in Dell advisory DSA-2024-006
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with vulnerable BIOS versions regardless of OS. Check Dell advisory for specific model and version details.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including BIOS/UEFI persistence, bypassing security controls, and establishing a permanent foothold on the server.

🟠

Likely Case

Privilege escalation from a low-privileged user to SYSTEM/root level access, allowing installation of malware or data exfiltration.

🟢

If Mitigated

Limited impact if proper access controls prevent local attacker access and BIOS-level security features are enabled.

🌐 Internet-Facing: LOW - Requires local access to the server, not directly exploitable over the network.
🏢 Internal Only: HIGH - Local attackers (including malicious insiders or compromised accounts) can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and low-privileged credentials. SMM exploitation typically requires specialized knowledge of BIOS internals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIOS updates specified in Dell advisory DSA-2024-006

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000222979/dsa-2024-006-security-update-for-dell-poweredge-server-bios-for-an-improper-smm-communication-buffer-verification-vulnerability

Restart Required: Yes

Instructions:

1. Identify your server model and current BIOS version. 2. Download appropriate BIOS update from Dell Support site. 3. Apply update using Dell Update Package or iDRAC. 4. Reboot server to complete installation.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and remote console access to trusted administrators only

Enable BIOS Security Features

all

Enable BIOS password, secure boot, and TPM where available

🧯 If You Can't Patch

  • Isolate affected servers in secure network segments with strict access controls
  • Implement multi-factor authentication and privileged access management for all server access

🔍 How to Verify

Check if Vulnerable:

Check BIOS version against affected versions in Dell advisory DSA-2024-006. Use 'dmidecode -t bios' on Linux or wmic bios get smbiosbiosversion on Windows.

Check Version:

Linux: dmidecode -t bios | grep Version, Windows: wmic bios get smbiosbiosversion

Verify Fix Applied:

Verify BIOS version has been updated to patched version listed in Dell advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual BIOS/UEFI access attempts
  • Privilege escalation from low to high privilege accounts
  • Unexpected system reboots or BIOS configuration changes

Network Indicators:

  • Unusual outbound connections from server management interfaces

SIEM Query:

source="bios_logs" OR event_id=6008 OR (process_name="powershell" AND command_line="*bios*" OR "*uefi*")

🔗 References

📤 Share & Export