CVE-2024-22433

8.8 HIGH

📋 TL;DR

Dell Data Protection Search versions 19.2.0 and above expose LDAP passwords in plain text through the LdapSettings.get_ldap_info function. This allows unauthenticated remote attackers to potentially gain complete control of DP Search systems and downstream protected devices. Organizations using affected versions are at risk of credential theft and system compromise.

💻 Affected Systems

Products:
  • Dell Data Protection Search
Versions: 19.2.0 and above
Operating Systems: All supported OS for DP Search
Default Config Vulnerable: ⚠️ Yes
Notes: Any system with DP Search 19.2.0+ using LDAP authentication is vulnerable. The vulnerability exists in the core product functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover allowing attacker to compromise DP Search and all downstream protected devices, leading to data exfiltration, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

LDAP credential theft enabling lateral movement within the network, privilege escalation, and access to sensitive systems protected by DP Search.

🟢

If Mitigated

Limited impact if system is isolated, uses unique credentials with minimal privileges, and has network segmentation preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated remote exploitation is possible, suggesting straightforward attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Dell advisory DSA-2024-063 for specific patched versions

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000221720/dsa-2024-063-security-update-for-dell-data-protection-search-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-063. 2. Download appropriate patch from Dell support portal. 3. Apply patch following Dell's installation guide. 4. Restart DP Search services. 5. Verify patch application and functionality.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to DP Search management interfaces to trusted IPs only

Use firewall rules to limit access to DP Search ports (e.g., iptables -A INPUT -s TRUSTED_IP -p tcp --dport DP_SEARCH_PORT -j ACCEPT)

Credential Rotation

all

Immediately rotate all LDAP service account passwords used by DP Search

Use your directory service tools to reset passwords for DP Search service accounts

🧯 If You Can't Patch

  • Isolate DP Search systems from internet and restrict internal network access to minimum required
  • Implement strict network monitoring and alerting for unusual access patterns to DP Search systems

🔍 How to Verify

Check if Vulnerable:

Check DP Search version via admin console or configuration files. If version is 19.2.0 or higher, system is vulnerable.

Check Version:

Check DP Search web interface or configuration files for version information

Verify Fix Applied:

Verify version after patch application shows updated version from Dell advisory. Test LDAP functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to DP Search
  • Multiple failed LDAP connections
  • Access to LdapSettings.get_ldap_info endpoint from unexpected sources

Network Indicators:

  • Unusual traffic patterns to DP Search management ports
  • External IPs accessing DP Search interfaces

SIEM Query:

source="dp_search.log" AND ("LdapSettings" OR "get_ldap_info") AND src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export