CVE-2024-49559
📋 TL;DR
Dell SmartFabric OS10 Software contains a default password vulnerability that allows low-privileged attackers with remote access to gain unauthorized access to affected systems. This affects versions 10.5.4.x through 10.6.0.x of the network operating system.
💻 Affected Systems
- Dell SmartFabric OS10 Software
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of network infrastructure, allowing attackers to reconfigure network devices, intercept traffic, or pivot to other systems.
Likely Case
Unauthorized administrative access to network switches, enabling configuration changes, traffic monitoring, or service disruption.
If Mitigated
Limited impact if network segmentation and access controls prevent remote exploitation attempts.
🎯 Exploit Status
Requires low-privileged remote access first, then credential guessing/brute-forcing. No public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patches referenced in Dell advisories DSA-2025-068 through DSA-2025-079
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities
Restart Required: No
Instructions:
1. Review Dell advisories DSA-2025-068 through DSA-2025-079. 2. Download appropriate patches for your OS10 version. 3. Apply patches following Dell's update procedures. 4. Change all default passwords after patching.
🔧 Temporary Workarounds
Change Default Passwords
allImmediately change all default administrative passwords to strong, unique credentials.
configure terminal
username admin password <strong_password> privilege 15
end
write memory
Restrict Remote Access
allLimit remote administrative access to trusted IP addresses only.
configure terminal
access-list 10 permit <trusted_ip>
line vty 0 15
access-class 10 in
end
write memory
🧯 If You Can't Patch
- Change all default passwords immediately and enforce strong password policies
- Implement network segmentation to isolate OS10 devices from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check OS10 version with 'show version' command and verify if using default administrative credentials.
Check Version:
show version | include Version
Verify Fix Applied:
Verify patch installation with 'show version' and confirm default passwords have been changed.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts from unexpected sources
- Successful logins from new/unexpected locations
- Configuration changes by unknown users
Network Indicators:
- Unexpected administrative protocol traffic (SSH/TELNET) to OS10 devices
- Traffic patterns indicating credential brute-forcing
SIEM Query:
source="os10_logs" AND (event_type="authentication_failure" OR event_type="configuration_change")
🔗 References
- https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities