CVE-2024-37140
📋 TL;DR
Dell PowerProtect DD versions before 8.0 contain an OS command injection vulnerability in an admin operation. A remote attacker with low privileges can execute arbitrary OS commands on the underlying system, potentially leading to complete system compromise. This affects Dell PowerProtect DD appliances running vulnerable software versions.
💻 Affected Systems
- Dell PowerProtect DD
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with administrative privileges, data exfiltration, ransomware deployment, or use as a pivot point into internal networks.
Likely Case
Unauthorized access to sensitive backup data, installation of persistent backdoors, or disruption of backup operations.
If Mitigated
Limited impact if network segmentation, strict access controls, and monitoring prevent exploitation attempts.
🎯 Exploit Status
Requires low-privileged access to admin operations. Command injection vulnerabilities are typically straightforward to exploit once details are known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to version 8.0 or later, or apply LTS updates: 7.13.1.0, 7.10.1.30, 7.7.5.40
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities
Restart Required: Yes
Instructions:
1. Backup configuration and data. 2. Download appropriate update from Dell Support. 3. Apply update following Dell documentation. 4. Restart system as required. 5. Verify update applied successfully.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to PowerProtect DD management interfaces to only trusted administrative networks.
Access Control Hardening
allImplement strict access controls, multi-factor authentication, and principle of least privilege for admin accounts.
🧯 If You Can't Patch
- Isolate PowerProtect DD systems from internet and untrusted networks using firewall rules.
- Implement strict monitoring and alerting for unusual admin operations or command execution patterns.
🔍 How to Verify
Check if Vulnerable:
Check PowerProtect DD version via web interface or CLI. Vulnerable if version is prior to 8.0, 7.13.1.0, 7.10.1.30, or 7.7.5.40.
Check Version:
From PowerProtect DD CLI: version
Verify Fix Applied:
Confirm version is 8.0 or later, or one of the patched LTS versions: 7.13.1.0, 7.10.1.30, 7.7.5.40.
📡 Detection & Monitoring
Log Indicators:
- Unusual admin operations, unexpected command execution patterns, failed authentication attempts followed by successful admin access
Network Indicators:
- Unusual outbound connections from PowerProtect DD system, connections to unexpected ports or IPs
SIEM Query:
source="powerprotect-dd" AND (event_type="admin_operation" AND command="*" OR process_execution="*")
🔗 References
- https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities