CVE-2024-37138

4.1 MEDIUM

📋 TL;DR

Dell PowerProtect DD management console contains a relative path traversal vulnerability that allows authenticated high-privilege attackers to send unauthorized files to managed systems. This affects Dell PowerProtect DD versions prior to 8.0 and specific LTS versions. Attackers must already have administrative access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Dell PowerProtect DD Management Console (DDMC)
Versions: Versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40
Operating Systems: DD OS (PowerProtect DD appliance operating system)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the DD Management Console component. Requires attacker to have high-privilege administrative access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with administrative credentials could upload malicious files to managed systems, potentially leading to system compromise, data exfiltration, or lateral movement within the environment.

🟠

Likely Case

Privilege escalation within the PowerProtect environment, unauthorized file transfers to managed systems, or disruption of backup operations.

🟢

If Mitigated

Limited impact due to existing network segmentation and strict access controls preventing unauthorized administrative access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrative access. Path traversal vulnerabilities are typically straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 8.0 or later, or apply LTS patches: 7.13.1.0, 7.10.1.30, or 7.7.5.40

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate update from Dell Support. 2. Follow Dell's PowerProtect DD upgrade documentation. 3. Apply the update during a maintenance window. 4. Restart the DD Management Console service or appliance as required.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to DDMC to only necessary personnel and implement strict access controls.

Network Segmentation

all

Isolate PowerProtect DD management interfaces from general network access.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all administrative access to DDMC
  • Segment the PowerProtect DD management network and restrict access to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check DDMC version via the web interface or CLI: 'version' command on DD appliance

Check Version:

ssh admin@ddmc-host version

Verify Fix Applied:

Verify version is 8.0 or later, or one of the patched LTS versions: 7.13.1.0, 7.10.1.30, or 7.7.5.40

📡 Detection & Monitoring

Log Indicators:

  • Unusual file transfer activities in DDMC logs
  • Multiple failed authentication attempts followed by successful admin login
  • Unexpected file operations in system logs

Network Indicators:

  • Unusual outbound connections from DDMC to managed systems
  • Unexpected file transfer patterns

SIEM Query:

source="ddmc" AND (event_type="file_transfer" OR event_type="path_traversal")

🔗 References

📤 Share & Export