CVE-2024-47480

7.8 HIGH

📋 TL;DR

Dell Inventory Collector Client versions before 12.7.0 have a path traversal vulnerability where low-privilege local attackers can exploit improper link resolution to gain elevated privileges and access unauthorized files. This affects organizations using Dell's inventory management software for asset tracking. Attackers need local access to vulnerable systems to exploit this.

💻 Affected Systems

Products:
  • Dell Inventory Collector Client
Versions: All versions prior to 12.7.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and Linux versions. Requires local access to the system running the vulnerable software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/root privileges, accesses sensitive files, installs malware, or establishes persistence on the system.

🟠

Likely Case

Local user escalates privileges to administrative level, accesses restricted files, or modifies system configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated system compromise without lateral movement.

🌐 Internet-Facing: LOW - Requires local access, not remotely exploitable.
🏢 Internal Only: HIGH - Local attackers can exploit this for privilege escalation on internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access but exploitation appears straightforward based on vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.7.0

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000255700/dsa-2024-475

Restart Required: Yes

Instructions:

1. Download Dell Inventory Collector Client version 12.7.0 from Dell support site. 2. Stop the Dell Inventory Collector service. 3. Install the updated version. 4. Restart the service and verify functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local user access to systems running Dell Inventory Collector to trusted administrators only.

Disable Service Temporarily

all

Stop the Dell Inventory Collector service if patching cannot be immediately performed.

Windows: sc stop "Dell Inventory Collector"
Linux: systemctl stop dell-inventory-collector

🧯 If You Can't Patch

  • Remove local user access for untrusted accounts on affected systems
  • Implement strict file system permissions and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check installed version of Dell Inventory Collector Client. If version is below 12.7.0, system is vulnerable.

Check Version:

Windows: "C:\Program Files\Dell\Inventory Collector\InventoryCollector.exe" --version or check Add/Remove Programs. Linux: dell-inventory-collector --version or check package manager.

Verify Fix Applied:

Verify installed version is 12.7.0 or higher and the service is running normally.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Access to system files by non-admin users
  • Dell Inventory Collector service errors or crashes

Network Indicators:

  • No network indicators - local exploitation only

SIEM Query:

EventID=4688 OR ProcessCreation where ParentProcessName contains "InventoryCollector" AND NewProcessName contains system executables

🔗 References

📤 Share & Export