CVE-2024-47481

6.5 MEDIUM

📋 TL;DR

Dell Data Lakehouse versions 1.0.0.0 and 1.1.0 contain an improper access control vulnerability that allows unauthenticated attackers on adjacent networks to cause denial of service. This affects organizations using these specific Dell Data Lakehouse versions in their data infrastructure. The vulnerability stems from insufficient access restrictions that can be exploited without credentials.

💻 Affected Systems

Products:
  • Dell Data Lakehouse
Versions: 1.0.0.0, 1.1.0
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires adjacent network access to the Data Lakehouse system. The advisory doesn't specify if specific configurations or deployment modes affect vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Dell Data Lakehouse systems, potentially affecting dependent applications and data processing workflows.

🟠

Likely Case

Temporary service degradation or unavailability of the Data Lakehouse service until systems are restarted or the attack stops.

🟢

If Mitigated

Minimal impact if network segmentation isolates the Data Lakehouse from untrusted adjacent networks and proper access controls are implemented.

🌐 Internet-Facing: LOW - The vulnerability requires adjacent network access, not direct internet exposure.
🏢 Internal Only: HIGH - Internal attackers or compromised devices on adjacent network segments can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability can be exploited without authentication from adjacent networks, making it relatively easy to trigger if network access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Dell advisory DSA-2024-419 for specific patched versions

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000240535/dsa-2024-419-security-update-for-dell-data-lakehouse-system-software-for-multiple-third-party-component-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-419. 2. Download and apply the security update from Dell support. 3. Restart the Data Lakehouse service or system as required. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Dell Data Lakehouse systems from untrusted network segments using firewalls or VLANs

Access Control Lists

all

Implement strict network access controls to limit which systems can communicate with Data Lakehouse

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Data Lakehouse from all untrusted adjacent networks
  • Monitor network traffic to Data Lakehouse systems for unusual patterns or DoS attempts

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Dell Data Lakehouse against affected versions 1.0.0.0 or 1.1.0

Check Version:

Check through Dell Data Lakehouse administration interface or consult Dell documentation for version checking

Verify Fix Applied:

Verify the version has been updated to a patched version specified in Dell advisory DSA-2024-419

📡 Detection & Monitoring

Log Indicators:

  • Unusual access attempts from adjacent networks
  • Service disruption logs
  • Authentication failure logs for unauthenticated access attempts

Network Indicators:

  • Unusual traffic patterns to Data Lakehouse ports
  • Traffic from unexpected adjacent network segments
  • DoS-like traffic patterns

SIEM Query:

source_ip IN (adjacent_network_range) AND dest_port IN (data_lakehouse_ports) AND auth_result = 'failure' OR 'none'

🔗 References

📤 Share & Export