CVE-2024-29173

6.8 MEDIUM

📋 TL;DR

This SSRF vulnerability in Dell PowerProtect DD allows remote attackers with high privileges to make the server send requests to internal systems, potentially exposing sensitive information. It affects PowerProtect DD versions before 8.0 and specific LTS releases. Attackers could access internal services that should not be externally reachable.

💻 Affected Systems

Products:
  • Dell PowerProtect DD
Versions: Versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40
Operating Systems: DD OS (proprietary)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high privileged attacker access. Affects all default configurations of vulnerable versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains access to internal metadata services, cloud credentials, or other internal APIs, leading to full system compromise or data exfiltration.

🟠

Likely Case

Information disclosure from internal services accessible to the PowerProtect DD server, potentially including configuration data or limited internal network access.

🟢

If Mitigated

Limited impact due to network segmentation and proper access controls restricting what internal resources the server can reach.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires high privileged credentials. No public exploit code available at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 8.0 or later, or apply LTS patches: 7.13.1.0, 7.10.1.30, 7.7.5.40

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download appropriate patch from Dell Support. 2. Apply patch following Dell PowerProtect DD update procedures. 3. Restart system as required. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict PowerProtect DD server's outbound network access to only necessary services

Privilege Reduction

all

Review and minimize high privilege accounts with access to PowerProtect DD management interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to limit what internal resources the PowerProtect DD server can access
  • Monitor for unusual outbound connections from PowerProtect DD servers to internal services

🔍 How to Verify

Check if Vulnerable:

Check PowerProtect DD version via web interface or CLI. If version is prior to 8.0 or not one of the patched LTS versions, system is vulnerable.

Check Version:

From PowerProtect DD CLI: version

Verify Fix Applied:

Verify version shows 8.0 or later, or one of the patched LTS versions: 7.13.1.0, 7.10.1.30, 7.7.5.40

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from PowerProtect DD server to internal IP ranges
  • Multiple failed authentication attempts followed by successful high privilege login

Network Indicators:

  • PowerProtect DD server making requests to internal metadata services (169.254.169.254, etc.)
  • Unexpected connections from PowerProtect DD to internal services

SIEM Query:

source="PowerProtect-DD" AND (dest_ip=169.254.169.254 OR dest_ip IN [internal_ranges]) AND protocol IN [http,https]

🔗 References

📤 Share & Export