CVE-2024-45761

5.4 MEDIUM

📋 TL;DR

Dell OpenManage Server Administrator (OMSA) versions 11.0.1.0 and prior contain an improper input validation vulnerability that allows remote low-privileged users to load arbitrary web plugins or Java classes. This could lead to denial of service or alteration of application/OS behavior. Organizations using vulnerable OMSA versions are affected.

💻 Affected Systems

Products:
  • Dell OpenManage Server Administrator (OMSA)
Versions: 11.0.1.0 and prior
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged user access to OMSA interface. OMSA typically runs on port 1311 (HTTP) and 1312 (HTTPS) by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains ability to execute arbitrary code, compromise server management functions, or cause persistent denial of service affecting server administration capabilities.

🟠

Likely Case

Attackers cause denial of service by loading malicious plugins/classes that crash OMSA services, disrupting server management operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated management network with no critical system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low-privileged authenticated access. No public exploit code available at disclosure time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.2.0 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000258320/dsa-2024-481-security-update-for-dell-openmanage-server-administrator-omsa-vulnerability

Restart Required: Yes

Instructions:

1. Download OMSA version 11.0.2.0 or later from Dell Support. 2. Backup current configuration. 3. Install update following Dell documentation. 4. Restart OMSA services.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to OMSA management ports (1311/1312) to trusted management networks only.

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port protocol="tcp" port="1311-1312" accept'
netsh advfirewall firewall add rule name="Restrict OMSA" dir=in action=allow protocol=TCP localport=1311-1312 remoteip=TRUSTED_NETWORK

Disable Unnecessary OMSA Features

all

Disable web server plugin loading features if not required for operations.

Edit OMSA configuration to disable plugin loading features (consult Dell documentation for specific parameters)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OMSA management interfaces from untrusted networks
  • Enforce principle of least privilege for OMSA user accounts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check OMSA version: On Windows: Open OMSA Web Interface → About. On Linux: dpkg -l | grep srvadmin or rpm -qa | grep srvadmin

Check Version:

Windows: wmic product where "name like 'Dell OpenManage%'" get version. Linux: omreport system about or check package version

Verify Fix Applied:

Verify version is 11.0.2.0 or later using same commands as above

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin loading events in OMSA logs
  • Multiple failed authentication attempts followed by successful low-privilege login
  • OMSA service crashes or restarts

Network Indicators:

  • Unusual traffic to OMSA ports (1311/1312) from non-management networks
  • Multiple HTTP POST requests to plugin/class loading endpoints

SIEM Query:

source="omsa.log" AND (event="plugin_load" OR event="class_load") AND user!="admin"

🔗 References

📤 Share & Export