CVE-2024-42422

8.3 HIGH

📋 TL;DR

Dell NetWorker versions 19.10 contain an authorization bypass vulnerability where an unauthenticated attacker can manipulate user-controlled keys to access unauthorized information. This affects organizations using Dell NetWorker 19.10 for backup and recovery operations. The vulnerability allows remote attackers to potentially disclose sensitive information without authentication.

💻 Affected Systems

Products:
  • Dell NetWorker
Versions: 19.10
Operating Systems: All supported platforms for Dell NetWorker 19.10
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Dell NetWorker 19.10 are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of backup data including sensitive files, credentials, and system information leading to data breach, ransomware deployment, or lateral movement.

🟠

Likely Case

Unauthorized access to backup metadata, configuration files, or partial data sets enabling reconnaissance and targeted attacks.

🟢

If Mitigated

Limited exposure if network segmentation restricts access and monitoring detects anomalous authentication attempts.

🌐 Internet-Facing: HIGH - Unauthenticated remote access means internet-exposed instances are immediately vulnerable to exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to NetWorker instances.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability requires understanding of NetWorker's API or interface but doesn't require authentication, making it accessible to determined attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the update specified in DSA-2024-478

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities

Restart Required: No

Instructions:

1. Download the security update from Dell Support. 2. Apply the patch following Dell's installation instructions. 3. Verify the update was successful using version checking commands.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to NetWorker instances to only trusted management networks

Configure firewall rules to limit inbound connections to NetWorker ports from authorized IP ranges only

Access Control Lists

all

Implement additional authentication layers or API gateways in front of NetWorker

Deploy reverse proxy with authentication or implement network ACLs on NetWorker servers

🧯 If You Can't Patch

  • Isolate NetWorker servers from internet and restrict internal access to only backup administrators
  • Implement strict monitoring and alerting for unauthorized access attempts to NetWorker services

🔍 How to Verify

Check if Vulnerable:

Check if running Dell NetWorker version 19.10 without the security update from DSA-2024-478

Check Version:

nsr -v or check NetWorker Management Console version information

Verify Fix Applied:

Confirm version is updated beyond the vulnerable 19.10 release and check patch installation logs

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API calls to NetWorker services
  • Unexpected access patterns to backup metadata
  • Failed authentication attempts followed by successful data access

Network Indicators:

  • Unusual traffic to NetWorker ports from unauthorized sources
  • Burst of requests to NetWorker API endpoints

SIEM Query:

source="networker" AND (event_type="api_access" AND user="anonymous") OR (status="success" AND auth_method="none")

🔗 References

📤 Share & Export