CVE-2024-37143

10.0 CRITICAL

📋 TL;DR

This CVE describes an Improper Link Resolution Before File Access vulnerability in multiple Dell PowerFlex and related products. An unauthenticated attacker with remote access could exploit this to execute arbitrary code on affected systems. The vulnerability affects Dell PowerFlex appliances, racks, custom nodes, InsightIQ, and Data Lakehouse products running outdated versions.

💻 Affected Systems

Products:
  • Dell PowerFlex appliance
  • Dell PowerFlex rack
  • Dell PowerFlex custom node using PowerFlex Manager
  • Dell InsightIQ
  • Dell Data Lakehouse
Versions: PowerFlex appliance: prior to IC 46.381.00 and IC 46.376.00; PowerFlex rack: prior to RCM 3.8.1.0 (3.8.x train) and prior to RCM 3.7.6.0 (3.7.x train); PowerFlex custom node: prior to 4.6.1.0; InsightIQ: prior to 5.1.1; Data Lakehouse: prior to 1.2.0.0
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: All affected products in their default configurations are vulnerable if running outdated versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to install malware, create backdoors, or disrupt storage operations.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have strict network access controls preventing unauthenticated remote access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated remote exploitation, suggesting relatively straightforward attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PowerFlex appliance: IC 46.381.00 or IC 46.376.00; PowerFlex rack: RCM 3.8.1.0 (3.8.x train) or RCM 3.7.6.0 (3.7.x train); PowerFlex custom node: 4.6.1.0; InsightIQ: 5.1.1; Data Lakehouse: 1.2.0.0

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000258342/dsa-2024-405-security-update-for-dell-products-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Identify affected products and versions. 2. Download appropriate patches from Dell Support. 3. Apply patches following Dell's update procedures. 4. Restart systems as required. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to affected systems to only trusted sources.

Access Control

all

Implement strict authentication requirements for all access to affected systems.

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement strict network monitoring and intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check product version against affected version ranges listed in the CVE description.

Check Version:

Product-specific commands vary; consult Dell documentation for each product's version check method.

Verify Fix Applied:

Verify installed version matches or exceeds the patched versions specified in the fix information.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts
  • Unusual file access patterns
  • Suspicious process execution

Network Indicators:

  • Unexpected connections to affected systems
  • Traffic patterns suggesting exploitation attempts

SIEM Query:

Search for authentication failures followed by unusual file access or process execution on affected systems.

🔗 References

📤 Share & Export