CVE-2024-37129

6.7 MEDIUM

📋 TL;DR

Dell Inventory Collector versions before 12.3.0.6 contain a path traversal vulnerability that allows local authenticated users to write files to arbitrary locations on the system. This could lead to arbitrary code execution with the privileges of the Dell Inventory Collector service. Only users with local authenticated access to systems running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Dell Inventory Collector
Versions: All versions prior to 12.3.0.6
Operating Systems: Windows, Linux (where Dell Inventory Collector is deployed)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated user access. The vulnerability exists in the file handling mechanism of the Dell Inventory Collector application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution with elevated privileges, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to persistence mechanisms, credential harvesting, or installation of backdoors on affected systems.

🟢

If Mitigated

Limited impact due to restricted local user access, proper privilege separation, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW - This requires local authenticated access, so internet-facing systems are not directly vulnerable unless attackers first gain local access through other means.
🏢 Internal Only: HIGH - Internal users with authenticated access can exploit this for privilege escalation, making it a significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of the vulnerability. The path traversal weakness could be leveraged to write malicious files to sensitive locations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.3.0.6

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000225779/dsa-2024-263

Restart Required: Yes

Instructions:

1. Download Dell Inventory Collector version 12.3.0.6 from Dell's official support site. 2. Stop the Dell Inventory Collector service. 3. Run the installer for version 12.3.0.6. 4. Restart the service after installation completes.

🔧 Temporary Workarounds

Restrict Local User Access

all

Limit which users have local authenticated access to systems running Dell Inventory Collector to reduce attack surface.

Implement File Integrity Monitoring

all

Monitor for unauthorized file writes in sensitive directories that could indicate exploitation attempts.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can authenticate to affected systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file write activities

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Dell Inventory Collector. If version is earlier than 12.3.0.6, the system is vulnerable.

Check Version:

On Windows: Check Add/Remove Programs or run 'wmic product where name="Dell Inventory Collector" get version'. On Linux: Check package manager or application directory for version information.

Verify Fix Applied:

Verify that Dell Inventory Collector version is 12.3.0.6 or later after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations by the Dell Inventory Collector process
  • Access to sensitive directories by non-privileged users
  • Failed attempts to write to restricted paths

Network Indicators:

  • Unusual outbound connections from systems running Dell Inventory Collector after local user activity

SIEM Query:

process_name:"Dell Inventory Collector" AND (file_write:true AND file_path:contains("..")) OR (file_write:true AND file_path:contains("/etc/") OR file_path:contains("C:\\Windows\\"))

🔗 References

📤 Share & Export