CVE-2024-37143
📋 TL;DR
This CVE describes an Improper Link Resolution Before File Access vulnerability in multiple Dell PowerFlex and related products. An unauthenticated attacker with remote access could exploit this to execute arbitrary code on affected systems. The vulnerability affects Dell PowerFlex appliances, racks, custom nodes, InsightIQ, and Data Lakehouse products running outdated versions.
💻 Affected Systems
- Dell PowerFlex appliance
- Dell PowerFlex rack
- Dell PowerFlex custom node using PowerFlex Manager
- Dell InsightIQ
- Dell Data Lakehouse
📦 What is this software?
Powerflex Appliance Intelligent Catalog by Dell
View all CVEs affecting Powerflex Appliance Intelligent Catalog →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Remote code execution allowing attackers to install malware, create backdoors, or disrupt storage operations.
If Mitigated
Limited impact if systems are isolated, patched, or have strict network access controls preventing unauthenticated remote access.
🎯 Exploit Status
The vulnerability allows unauthenticated remote exploitation, suggesting relatively straightforward attack vectors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: PowerFlex appliance: IC 46.381.00 or IC 46.376.00; PowerFlex rack: RCM 3.8.1.0 (3.8.x train) or RCM 3.7.6.0 (3.7.x train); PowerFlex custom node: 4.6.1.0; InsightIQ: 5.1.1; Data Lakehouse: 1.2.0.0
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000258342/dsa-2024-405-security-update-for-dell-products-for-multiple-vulnerabilities
Restart Required: Yes
Instructions:
1. Identify affected products and versions. 2. Download appropriate patches from Dell Support. 3. Apply patches following Dell's update procedures. 4. Restart systems as required. 5. Verify successful update.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to affected systems to only trusted sources.
Access Control
allImplement strict authentication requirements for all access to affected systems.
🧯 If You Can't Patch
- Isolate affected systems from internet and untrusted networks
- Implement strict network monitoring and intrusion detection
🔍 How to Verify
Check if Vulnerable:
Check product version against affected version ranges listed in the CVE description.
Check Version:
Product-specific commands vary; consult Dell documentation for each product's version check method.
Verify Fix Applied:
Verify installed version matches or exceeds the patched versions specified in the fix information.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access attempts
- Unusual file access patterns
- Suspicious process execution
Network Indicators:
- Unexpected connections to affected systems
- Traffic patterns suggesting exploitation attempts
SIEM Query:
Search for authentication failures followed by unusual file access or process execution on affected systems.