CVE-2024-49557

7.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Dell SmartFabric OS10 Software that allows a low-privileged attacker with local access to execute arbitrary code on affected systems. The vulnerability affects multiple versions of Dell's networking OS10 software. Organizations using vulnerable versions of Dell SmartFabric OS10 are at risk.

💻 Affected Systems

Products:
  • Dell SmartFabric OS10 Software
Versions: 10.5.3.x, 10.5.4.x, 10.5.5.x, 10.5.6.x
Operating Systems: Dell OS10
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access with low privileges; network devices running affected OS10 versions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control of the network device, potentially pivoting to other systems, disrupting network operations, or establishing persistent access.

🟠

Likely Case

Local attackers escalate privileges to gain administrative control of the network device, enabling configuration changes, traffic interception, or lateral movement.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the compromised device only.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access with low privileges; command injection vulnerabilities are typically straightforward to exploit once details are known

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Dell advisory DSA-2024-425 for specific fixed versions

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-425. 2. Download appropriate OS10 update from Dell support. 3. Apply update following Dell's upgrade procedures. 4. Reboot affected devices.

🔧 Temporary Workarounds

Restrict local access

dell-os10

Limit local console and SSH access to trusted administrators only

configure terminal
line console 0
password <strong_password>
login
line vty 0 15
password <strong_password>
login
access-class <acl_name> in

Implement privilege separation

dell-os10

Use role-based access control to limit low-privileged users

configure terminal
role name restricted
rule 1 deny all
username <user> password <password> role restricted

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Monitor for unusual command execution patterns and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check OS10 version with 'show version' command and compare against affected versions

Check Version:

show version | include Version

Verify Fix Applied:

Verify OS10 version is updated beyond affected ranges and check Dell advisory for specific fixed versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Privilege escalation attempts
  • Unexpected configuration changes

Network Indicators:

  • Unusual traffic patterns from network devices
  • Unexpected administrative connections

SIEM Query:

source="dell-os10" AND (event_type="command_execution" OR event_type="privilege_change")

🔗 References

📤 Share & Export