CVE-2024-45764

9.0 CRITICAL

📋 TL;DR

Dell Enterprise SONiC OS versions 4.1.x and 4.2.x contain a missing critical step in authentication that allows unauthenticated remote attackers to bypass protection mechanisms. This affects organizations using Dell's SONiC network operating system on switches and routers. Attackers could potentially gain unauthorized access to network devices.

💻 Affected Systems

Products:
  • Dell Enterprise SONiC OS
Versions: 4.1.x, 4.2.x
Operating Systems: SONiC (Network Operating System)
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments running affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network infrastructure, allowing attackers to intercept traffic, modify configurations, deploy malware, or disrupt network operations.

🟠

Likely Case

Unauthorized access to network devices leading to configuration changes, data interception, or lateral movement within the network.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent exploitation attempts from reaching vulnerable devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated remote exploitation is possible, suggesting relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Upgrade to version 4.3.0 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000245655/dsa-2024-449-security-update-for-dell-enterprise-sonic-distribution-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the updated SONiC OS version from Dell support. 2. Backup current configuration. 3. Install the update following Dell's upgrade procedures. 4. Reboot the device. 5. Verify the new version is running correctly.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to SONiC management interfaces using firewall rules or network segmentation.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SONiC devices from untrusted networks
  • Monitor authentication logs for unusual access patterns and failed authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check SONiC OS version using 'show version' command. If version starts with 4.1 or 4.2, the system is vulnerable.

Check Version:

show version

Verify Fix Applied:

After upgrade, run 'show version' command and verify version is 4.3.0 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Access from unexpected IP addresses
  • Configuration changes without proper authentication

Network Indicators:

  • Unexpected traffic to SONiC management interfaces
  • Authentication bypass attempts

SIEM Query:

source="sonic" AND (event_type="authentication" AND result="success" AND user="unknown") OR (event_type="configuration_change" AND user="unauthenticated")

🔗 References

📤 Share & Export