CVE-2024-29175

5.9 MEDIUM

📋 TL;DR

Dell PowerProtect Data Domain systems using weak cryptographic algorithms are vulnerable to man-in-the-middle attacks. Remote unauthenticated attackers can intercept and expose sensitive session information. This affects all systems running vulnerable versions of the software.

💻 Affected Systems

Products:
  • Dell PowerProtect Data Domain
Versions: Versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30
Operating Systems: DD OS (Data Domain Operating System)
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of backup data confidentiality and integrity through intercepted administrative sessions, potentially leading to data theft or ransomware deployment.

🟠

Likely Case

Interception of administrative sessions exposing credentials, configuration data, and potentially backup metadata.

🟢

If Mitigated

Limited exposure if network segmentation and encryption controls prevent attacker access to vulnerable interfaces.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers to intercept sessions without any authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to escalate privileges or intercept sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires man-in-the-middle positioning and knowledge of weak cryptographic implementation details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Dell Support. 2. Apply the patch following Dell's upgrade procedures. 3. Reboot the Data Domain system as required. 4. Verify the new version is running.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Data Domain management interfaces from untrusted networks

VPN/Encrypted Tunnel

all

Require VPN or encrypted tunnel for all administrative access

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach Data Domain management interfaces
  • Monitor for unusual network traffic patterns indicating man-in-the-middle attempts

🔍 How to Verify

Check if Vulnerable:

Check the Data Domain version via the web interface or CLI: 'version' command

Check Version:

version

Verify Fix Applied:

Verify version is 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed connection attempts from unexpected sources

Network Indicators:

  • Unexpected traffic interception patterns
  • SSL/TLS handshake anomalies

SIEM Query:

source="Data Domain" AND (event_type="authentication" OR event_type="connection") AND result="failure"

🔗 References

📤 Share & Export