CVE-2024-47484

8.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Dell Avamar allows unauthenticated remote attackers to execute arbitrary commands on affected systems. It affects Dell Avamar versions prior to 19.12 (excluding certain patched 19.10 versions), potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • Dell Avamar
  • Dell Avamar Virtual Edition
Versions: All versions prior to 19.12, excluding 19.10 and 19.10SP1 with patch 338869
Operating Systems: All supported OS for Dell Avamar
Default Config Vulnerable: ⚠️ Yes
Notes: Unauthenticated remote access required; systems exposed to network are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/administrator privileges, data exfiltration, ransomware deployment, or use as pivot point in network attacks.

🟠

Likely Case

Unauthenticated remote code execution leading to data theft, system manipulation, or installation of persistent backdoors.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF protection, and intrusion detection systems blocking exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity; unauthenticated nature increases risk

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.12 with patch 338905, or 19.10/19.10SP1 with patch 338869

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download appropriate patch from Dell support portal. 2. Apply patch following Dell's documented procedures. 3. Restart Avamar services as required. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Avamar systems to only trusted management networks

Web Application Firewall

all

Deploy WAF with SQL injection protection rules in front of Avamar

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Avamar version via Avamar Administrator GUI or command line; compare against affected versions list

Check Version:

avmgr version (on Avamar server)

Verify Fix Applied:

Verify patch installation through Avamar patch management interface or version check commands

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in Avamar logs
  • Unexpected command execution events
  • Failed authentication attempts followed by SQL errors

Network Indicators:

  • SQL injection patterns in HTTP requests to Avamar
  • Unexpected outbound connections from Avamar systems

SIEM Query:

source="avamar" AND ("sql" OR "injection" OR "malformed query")

🔗 References

📤 Share & Export