CVE-2024-30472

7.5 HIGH

📋 TL;DR

Dell ThinOS 2402's Telemetry Dashboard v1.0.0.8 contains a sensitive information disclosure vulnerability. An unauthenticated attacker with local access to the device can exploit this to access confidential data. This affects Dell ThinOS 2402 systems running the vulnerable Telemetry Dashboard version.

💻 Affected Systems

Products:
  • Dell ThinOS 2402 Telemetry Dashboard
Versions: v1.0.0.8
Operating Systems: Dell ThinOS 2402
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Dell ThinOS 2402 with Telemetry Dashboard v1.0.0.8 installed. Requires local access to the device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could extract sensitive system information, configuration data, or credentials stored by the Telemetry Dashboard, potentially enabling further attacks or data breaches.

🟠

Likely Case

Local users or attackers with physical access could access telemetry data, system information, or configuration details that should be protected.

🟢

If Mitigated

With proper access controls and network segmentation, the impact is limited to authorized local users only.

🌐 Internet-Facing: LOW - The vulnerability requires local access to the device, making remote exploitation unlikely unless the device is exposed via other means.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but the requirement for local access reduces the attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires local access to the device but no authentication. The specific method of information disclosure is not detailed in public sources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Dell ThinOS 2402 with patched Telemetry Dashboard (refer to Dell advisory for specific version)

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000225289/dsa-2024-229

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-229. 2. Download the latest ThinOS 2402 update from Dell Support. 3. Apply the update to affected devices following Dell's instructions. 4. Restart devices to complete the update.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and local network access to affected devices to authorized personnel only.

Disable Telemetry Dashboard

all

If not required, disable the Telemetry Dashboard feature on affected devices.

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized local access to devices.
  • Segment affected devices on isolated networks and monitor for suspicious local access attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Telemetry Dashboard version on Dell ThinOS 2402 devices. If it is v1.0.0.8, the device is vulnerable.

Check Version:

Use Dell ThinOS management tools or console commands specific to the device to check the Telemetry Dashboard version (exact command varies by deployment).

Verify Fix Applied:

After applying the Dell update, verify that the Telemetry Dashboard version is no longer v1.0.0.8 and check Dell's advisory for confirmation of patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual local access attempts to Telemetry Dashboard components
  • Log entries indicating information access from unauthorized local users

Network Indicators:

  • Local network traffic to Telemetry Dashboard ports from unexpected sources

SIEM Query:

Search for local authentication bypass events or access to Telemetry Dashboard services from unauthenticated users on Dell ThinOS devices.

🔗 References

📤 Share & Export