CVE-2024-0170
📋 TL;DR
This vulnerability allows authenticated attackers to escape the restricted shell in Dell Unity's svc_cava utility and execute arbitrary operating system commands with root privileges. It affects Dell Unity, Unity VSA, and Unity XT storage systems running versions prior to 5.4. Attackers need valid credentials to exploit this command injection flaw.
💻 Affected Systems
- Dell Unity
- Dell Unity VSA
- Dell Unity XT
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level access, allowing data theft, system destruction, or lateral movement to other systems.
Likely Case
Privilege escalation leading to unauthorized access to sensitive storage data and configuration manipulation.
If Mitigated
Limited impact if strong authentication controls and network segmentation prevent attacker access.
🎯 Exploit Status
Exploitation requires authenticated access but command injection is straightforward once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 5.4 or later
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000222010/dsa-2024-042-dell-unity-dell-unity-vsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities
Restart Required: Yes
Instructions:
1. Download Dell Unity OS 5.4 or later from Dell Support. 2. Apply the update following Dell's upgrade procedures. 3. Reboot the system as required by the update process.
🔧 Temporary Workarounds
Restrict svc_cava Access
allLimit access to the svc_cava utility through network controls and user permissions.
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from accessing the Dell Unity management interface.
- Segment Dell Unity systems on isolated network segments to limit potential lateral movement.
🔍 How to Verify
Check if Vulnerable:
Check Dell Unity OS version via management interface or CLI. If version is below 5.4, system is vulnerable.
Check Version:
Check via Dell Unity Unisphere interface or use system-specific CLI commands for version verification.
Verify Fix Applied:
Verify OS version is 5.4 or higher after applying the update.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution patterns in system logs
- Multiple failed authentication attempts followed by svc_cava access
Network Indicators:
- Unexpected network connections from Dell Unity management interface
- Anomalous traffic patterns to/from storage systems
SIEM Query:
source="dell_unity" AND (event_type="command_execution" OR process="svc_cava")
🔗 References
- https://www.dell.com/support/kbdoc/en-us/000222010/dsa-2024-042-dell-unity-dell-unity-vsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000222010/dsa-2024-042-dell-unity-dell-unity-vsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities