CVE-2024-37131

7.5 HIGH

📋 TL;DR

CVE-2024-37131 is an overly permissive Cross-Origin Resource Policy (CORP) vulnerability in Dell Secure Connect Gateway Policy Manager. This allows remote unauthenticated attackers to execute malicious actions in the context of authenticated users. All versions of SCG Policy Manager are affected.

💻 Affected Systems

Products:
  • Dell Secure Connect Gateway Policy Manager
Versions: All versions
Operating Systems: Not specified - likely appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: This is a web application vulnerability affecting the CORP configuration of the SCG Policy Manager interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SCG Policy Manager application, allowing attackers to perform administrative actions, modify policies, access sensitive data, or pivot to other systems.

🟠

Likely Case

Unauthorized access to sensitive configuration data, policy manipulation, or privilege escalation within the application.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable service.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates remote unauthenticated exploitation is possible, suggesting relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to the latest version as specified in DSA-2024-254

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000225956/dsa-2024-254-security-update-for-dell-secure-connect-gateway-policy-manager-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell Security Advisory DSA-2024-254. 2. Download the latest SCG Policy Manager update from Dell support. 3. Apply the update following Dell's deployment procedures. 4. Restart the SCG Policy Manager service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SCG Policy Manager to only trusted administrative networks

Web Application Firewall Rules

all

Implement WAF rules to block cross-origin requests to the SCG Policy Manager

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the SCG Policy Manager interface
  • Monitor for unusual cross-origin requests or unauthorized administrative actions

🔍 How to Verify

Check if Vulnerable:

Check if your SCG Policy Manager version is listed as vulnerable in Dell advisory DSA-2024-254

Check Version:

Check the SCG Policy Manager web interface or administrative console for version information

Verify Fix Applied:

Verify you have applied the update specified in DSA-2024-254 and the version matches the patched release

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-origin requests to SCG Policy Manager
  • Unauthorized administrative actions or policy changes

Network Indicators:

  • Cross-origin requests to SCG Policy Manager endpoints from unexpected sources

SIEM Query:

source="scg-policy-manager" AND (http_referer NOT IN allowed_domains OR cross_origin_request=true)

🔗 References

📤 Share & Export