CVE-2024-28980

6.5 MEDIUM

📋 TL;DR

Dell RecoverPoint for VMs versions 6.0.x contain a broken cryptographic algorithm vulnerability in SSH that allows unauthenticated remote attackers to potentially execute arbitrary code. This affects organizations using vulnerable versions of Dell RecoverPoint for VMs for virtual machine data protection and recovery. The vulnerability stems from using weak cryptographic algorithms that can be exploited to compromise SSH connections.

💻 Affected Systems

Products:
  • Dell RecoverPoint for Virtual Machines
Versions: 6.0.x
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in SSH implementation; systems with SSH enabled are vulnerable regardless of other configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code, access sensitive data, disrupt recovery operations, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to the RecoverPoint management interface leading to data exposure, configuration changes, or service disruption.

🟢

If Mitigated

Limited impact if SSH access is restricted to trusted networks and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory states 'unauthenticated attacker with remote access could potentially exploit this vulnerability' suggesting relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 6.1 or later as specified in Dell advisory

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-429. 2. Download and apply the latest patch from Dell Support. 3. Restart affected RecoverPoint services. 4. Verify successful update and functionality.

🔧 Temporary Workarounds

Restrict SSH Network Access

linux

Limit SSH access to trusted IP addresses using firewall rules to reduce attack surface.

# Example iptables rule: iptables -A INPUT -p tcp --dport 22 -s TRUSTED_IP -j ACCEPT
# Example iptables rule: iptables -A INPUT -p tcp --dport 22 -j DROP

Disable SSH if Not Required

linux

Temporarily disable SSH service if not actively needed for operations.

systemctl stop sshd
systemctl disable sshd

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RecoverPoint systems from untrusted networks
  • Deploy network-based intrusion detection/prevention systems to monitor for SSH exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check RecoverPoint version via management interface or CLI; versions 6.0.x are vulnerable.

Check Version:

Check via RecoverPoint management interface or consult Dell documentation for version query commands

Verify Fix Applied:

Verify version is updated to 6.1 or later and test SSH connectivity with security scanning tools.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SSH connection attempts
  • Failed authentication attempts from unexpected sources
  • SSH protocol anomalies

Network Indicators:

  • SSH traffic to RecoverPoint systems from unexpected sources
  • SSH protocol downgrade attempts

SIEM Query:

source="recoverpoint" AND (event="ssh_failed_auth" OR event="ssh_connection") | stats count by src_ip

🔗 References

📤 Share & Export