CVE-2024-0170

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to escape the restricted shell in Dell Unity's svc_cava utility and execute arbitrary operating system commands with root privileges. It affects Dell Unity, Unity VSA, and Unity XT storage systems running versions prior to 5.4. Attackers need valid credentials to exploit this command injection flaw.

💻 Affected Systems

Products:
  • Dell Unity
  • Dell Unity VSA
  • Dell Unity XT
Versions: All versions prior to 5.4
Operating Systems: Dell Unity OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the svc_cava utility.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, allowing data theft, system destruction, or lateral movement to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive storage data and configuration manipulation.

🟢

If Mitigated

Limited impact if strong authentication controls and network segmentation prevent attacker access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.4 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000222010/dsa-2024-042-dell-unity-dell-unity-vsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download Dell Unity OS 5.4 or later from Dell Support. 2. Apply the update following Dell's upgrade procedures. 3. Reboot the system as required by the update process.

🔧 Temporary Workarounds

Restrict svc_cava Access

all

Limit access to the svc_cava utility through network controls and user permissions.

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from accessing the Dell Unity management interface.
  • Segment Dell Unity systems on isolated network segments to limit potential lateral movement.

🔍 How to Verify

Check if Vulnerable:

Check Dell Unity OS version via management interface or CLI. If version is below 5.4, system is vulnerable.

Check Version:

Check via Dell Unity Unisphere interface or use system-specific CLI commands for version verification.

Verify Fix Applied:

Verify OS version is 5.4 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by svc_cava access

Network Indicators:

  • Unexpected network connections from Dell Unity management interface
  • Anomalous traffic patterns to/from storage systems

SIEM Query:

source="dell_unity" AND (event_type="command_execution" OR process="svc_cava")

🔗 References

📤 Share & Export