CVE-2024-37125

7.5 HIGH

📋 TL;DR

Dell SmartFabric OS10 Software contains an uncontrolled resource consumption vulnerability that allows remote unauthenticated attackers to cause denial of service. This affects versions 10.5.3.x through 10.5.6.x of Dell's networking operating system. Network administrators using these versions should prioritize patching.

💻 Affected Systems

Products:
  • Dell SmartFabric OS10 Software
Versions: 10.5.3.x, 10.5.4.x, 10.5.5.x, 10.5.6.x
Operating Systems: Dell OS10
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected OS10 versions are vulnerable in default configurations. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network disruption through resource exhaustion, rendering affected switches/routers unresponsive and requiring physical reboot.

🟠

Likely Case

Degraded network performance, intermittent connectivity issues, and potential service outages on affected devices.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to untrusted networks.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing devices particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates remote unauthenticated exploitation is possible, suggesting relatively simple attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 10.5.7.0 or later as specified in Dell advisory

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000228976/dsa-2024-274-security-update-for-dell-networking-os10-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the latest OS10 firmware from Dell Support. 2. Backup current configuration. 3. Apply the firmware update following Dell's upgrade procedures. 4. Reboot the device. 5. Verify the new version is running.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to OS10 management interfaces to trusted networks only

# Configure ACLs to restrict access to management interfaces
# Example: ip access-list standard MGMT-ACL
# permit 10.0.0.0/8
# deny any

Rate Limiting

all

Implement rate limiting on management interfaces to prevent resource exhaustion

# Configure rate limiting policies
# Example: policy-map INPUT-POLICY
# class CLASS-MGMT
# police cir 1000000

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IP addresses only
  • Deploy network monitoring and intrusion detection systems to detect and alert on DoS attempts

🔍 How to Verify

Check if Vulnerable:

Check OS version with 'show version' command and compare against affected versions (10.5.3.x through 10.5.6.x)

Check Version:

show version | include Version

Verify Fix Applied:

Verify OS version is 10.5.7.0 or later using 'show version' command

📡 Detection & Monitoring

Log Indicators:

  • Unusual resource consumption spikes
  • Repeated connection attempts to management interfaces
  • System performance degradation alerts

Network Indicators:

  • High volume of traffic to OS10 management ports from untrusted sources
  • Unusual protocol patterns targeting network devices

SIEM Query:

source="dell_os10" AND (event_type="resource_exhaustion" OR event_type="high_cpu" OR event_type="high_memory")

🔗 References

📤 Share & Export