CVE-2024-42422
📋 TL;DR
Dell NetWorker versions 19.10 contain an authorization bypass vulnerability where an unauthenticated attacker can manipulate user-controlled keys to access unauthorized information. This affects organizations using Dell NetWorker 19.10 for backup and recovery operations. The vulnerability allows remote attackers to potentially disclose sensitive information without authentication.
💻 Affected Systems
- Dell NetWorker
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of backup data including sensitive files, credentials, and system information leading to data breach, ransomware deployment, or lateral movement.
Likely Case
Unauthorized access to backup metadata, configuration files, or partial data sets enabling reconnaissance and targeted attacks.
If Mitigated
Limited exposure if network segmentation restricts access and monitoring detects anomalous authentication attempts.
🎯 Exploit Status
The vulnerability requires understanding of NetWorker's API or interface but doesn't require authentication, making it accessible to determined attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply the update specified in DSA-2024-478
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities
Restart Required: No
Instructions:
1. Download the security update from Dell Support. 2. Apply the patch following Dell's installation instructions. 3. Verify the update was successful using version checking commands.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to NetWorker instances to only trusted management networks
Configure firewall rules to limit inbound connections to NetWorker ports from authorized IP ranges only
Access Control Lists
allImplement additional authentication layers or API gateways in front of NetWorker
Deploy reverse proxy with authentication or implement network ACLs on NetWorker servers
🧯 If You Can't Patch
- Isolate NetWorker servers from internet and restrict internal access to only backup administrators
- Implement strict monitoring and alerting for unauthorized access attempts to NetWorker services
🔍 How to Verify
Check if Vulnerable:
Check if running Dell NetWorker version 19.10 without the security update from DSA-2024-478
Check Version:
nsr -v or check NetWorker Management Console version information
Verify Fix Applied:
Confirm version is updated beyond the vulnerable 19.10 release and check patch installation logs
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated API calls to NetWorker services
- Unexpected access patterns to backup metadata
- Failed authentication attempts followed by successful data access
Network Indicators:
- Unusual traffic to NetWorker ports from unauthorized sources
- Burst of requests to NetWorker API endpoints
SIEM Query:
source="networker" AND (event_type="api_access" AND user="anonymous") OR (status="success" AND auth_method="none")