CVE-2024-28967

5.4 MEDIUM

📋 TL;DR

Dell Secure Connect Gateway (SCG) versions before 5.24.00.00 have an improper access control vulnerability in an internal maintenance REST API. If an administrator enables this API via the UI, a remote low-privileged attacker could execute admin-only API calls, potentially accessing restricted resources or changing system state. This affects Dell SCG deployments with the vulnerable API enabled.

💻 Affected Systems

Products:
  • Dell Secure Connect Gateway (SCG)
Versions: Versions prior to 5.24.00.00
Operating Systems: Not specified; likely appliance-based
Default Config Vulnerable: ✅ No
Notes: Vulnerability only exists if an administrator enables the internal maintenance REST API via the UI.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative access to the SCG backend database, leading to data theft, configuration changes, or complete system compromise.

🟠

Likely Case

Unauthorized access to sensitive configuration data or limited system state changes due to API restrictions.

🟢

If Mitigated

No impact if the vulnerable API is disabled or the system is patched.

🌐 Internet-Facing: MEDIUM - Exploitation requires network access to the SCG, but the API must be explicitly enabled by an admin.
🏢 Internal Only: MEDIUM - Similar risk internally if the API is enabled; attackers could pivot from internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation involves sending crafted API requests once the API is enabled.

Attack requires low-privileged access and the API to be enabled; no public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.24.00.00

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities

Restart Required: Yes

Instructions:

1. Download Dell SCG version 5.24.00.00 or later from Dell support. 2. Follow Dell's upgrade procedures for SCG appliances or software. 3. Restart the system as required after patching.

🔧 Temporary Workarounds

Disable the internal maintenance REST API

all

Prevent exploitation by disabling the vulnerable API if not needed.

Access the SCG admin UI, navigate to the API settings, and disable the internal maintenance REST API.

🧯 If You Can't Patch

  • Disable the internal maintenance REST API via the admin UI to remove the attack surface.
  • Restrict network access to the SCG to trusted IPs only using firewall rules.

🔍 How to Verify

Check if Vulnerable:

Check the SCG version via the admin UI or CLI; if below 5.24.00.00 and the internal maintenance REST API is enabled, the system is vulnerable.

Check Version:

Use the SCG admin UI or CLI command specific to the appliance (e.g., 'show version' or similar).

Verify Fix Applied:

Confirm the SCG version is 5.24.00.00 or higher and verify the API is disabled or patched per vendor guidance.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API access logs from non-admin users to internal maintenance endpoints.
  • Failed authentication attempts or access denied errors for admin-only APIs.

Network Indicators:

  • Suspicious HTTP requests to SCG REST API endpoints from unauthorized sources.

SIEM Query:

source="dell-scg" AND (event_type="api_access" AND user_role!="admin") OR (http_request LIKE "%maintenance%" AND response_code=200)

🔗 References

📤 Share & Export