CVE-2024-48013

8.8 HIGH

📋 TL;DR

Dell SmartFabric OS10 Software contains an execution with unnecessary privileges vulnerability that allows low-privileged remote attackers to elevate their privileges. This affects versions 10.5.4.x through 10.6.0.x. Organizations using these Dell networking switches are vulnerable to privilege escalation attacks.

💻 Affected Systems

Products:
  • Dell SmartFabric OS10 Software
Versions: 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x
Operating Systems: OS10
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments running affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the network switch, enabling network traffic interception, configuration changes, and lateral movement to other systems.

🟠

Likely Case

Attackers with initial access can escalate privileges to modify network configurations, potentially disrupting operations or creating backdoors.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the affected switch with minimal lateral movement potential.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low-privileged remote access first, then exploitation of the privilege escalation vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates per Dell advisories DSA-2025-068 through DSA-2025-079

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell advisories DSA-2025-068 through DSA-2025-079. 2. Download appropriate patches from Dell support. 3. Apply patches to affected switches following Dell's update procedures. 4. Verify patch application and system functionality.

🔧 Temporary Workarounds

Restrict Remote Access

all

Limit remote access to affected switches to trusted IP addresses only

configure terminal
access-list standard RESTRICTED
permit host [TRUSTED_IP]
deny any
line vty 0 15
access-class RESTRICTED in

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected switches from critical systems
  • Enforce principle of least privilege for all user accounts accessing the switches

🔍 How to Verify

Check if Vulnerable:

Check OS version with 'show version' command and compare against affected versions

Check Version:

show version | include Version

Verify Fix Applied:

Verify patch application with 'show version' and ensure version is updated beyond affected ranges

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized configuration changes
  • Multiple failed login attempts followed by successful privileged access

Network Indicators:

  • Unusual network traffic patterns from switch management interfaces
  • Unexpected configuration changes to switch settings

SIEM Query:

source="dell_os10" AND (event_type="privilege_escalation" OR config_change="unauthorized")

🔗 References

📤 Share & Export