CVE-2024-37140

8.8 HIGH

📋 TL;DR

Dell PowerProtect DD versions before 8.0 contain an OS command injection vulnerability in an admin operation. A remote attacker with low privileges can execute arbitrary OS commands on the underlying system, potentially leading to complete system compromise. This affects Dell PowerProtect DD appliances running vulnerable software versions.

💻 Affected Systems

Products:
  • Dell PowerProtect DD
Versions: Versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40
Operating Systems: PowerProtect DD OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires admin operation access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data exfiltration, ransomware deployment, or use as a pivot point into internal networks.

🟠

Likely Case

Unauthorized access to sensitive backup data, installation of persistent backdoors, or disruption of backup operations.

🟢

If Mitigated

Limited impact if network segmentation, strict access controls, and monitoring prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Remote exploitation possible if vulnerable interface is exposed to internet.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged access to admin operations. Command injection vulnerabilities are typically straightforward to exploit once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 8.0 or later, or apply LTS updates: 7.13.1.0, 7.10.1.30, 7.7.5.40

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Download appropriate update from Dell Support. 3. Apply update following Dell documentation. 4. Restart system as required. 5. Verify update applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to PowerProtect DD management interfaces to only trusted administrative networks.

Access Control Hardening

all

Implement strict access controls, multi-factor authentication, and principle of least privilege for admin accounts.

🧯 If You Can't Patch

  • Isolate PowerProtect DD systems from internet and untrusted networks using firewall rules.
  • Implement strict monitoring and alerting for unusual admin operations or command execution patterns.

🔍 How to Verify

Check if Vulnerable:

Check PowerProtect DD version via web interface or CLI. Vulnerable if version is prior to 8.0, 7.13.1.0, 7.10.1.30, or 7.7.5.40.

Check Version:

From PowerProtect DD CLI: version

Verify Fix Applied:

Confirm version is 8.0 or later, or one of the patched LTS versions: 7.13.1.0, 7.10.1.30, 7.7.5.40.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin operations, unexpected command execution patterns, failed authentication attempts followed by successful admin access

Network Indicators:

  • Unusual outbound connections from PowerProtect DD system, connections to unexpected ports or IPs

SIEM Query:

source="powerprotect-dd" AND (event_type="admin_operation" AND command="*" OR process_execution="*")

🔗 References

📤 Share & Export