CVE-2024-52538

7.6 HIGH

📋 TL;DR

This SQL injection vulnerability in Dell Avamar allows low-privileged remote attackers to execute arbitrary SQL commands, potentially leading to script injection. Affected systems include Dell Avamar versions prior to 19.12 (excluding certain patched 19.10 versions).

💻 Affected Systems

Products:
  • Dell Avamar
  • Dell Avamar Virtual Edition
Versions: All versions prior to 19.12, excluding 19.10 and 19.10SP1 with patch 338869
Operating Systems: All supported Avamar OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged remote access to the vulnerable interface. Systems with patch 338905 (for 19.12) or 338869 (for 19.10/19.10SP1) are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Avamar database, data exfiltration, privilege escalation to administrative access, and potential lateral movement within the environment.

🟠

Likely Case

Data leakage from the Avamar database, manipulation of backup metadata, and potential denial of service affecting backup operations.

🟢

If Mitigated

Limited impact due to network segmentation and proper access controls restricting low-privileged user access to vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged credentials. SQL injection vulnerabilities are typically easy to exploit with readily available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.12 with patch 338905, or 19.10/19.10SP1 with patch 338869

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Dell Support. 2. Apply patch 338905 for version 19.12 or patch 338869 for versions 19.10/19.10SP1. 3. Restart the Avamar services as required by the patch documentation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Avamar management interfaces to only trusted administrative networks.

Access Control

all

Implement strict access controls to limit low-privileged user access to vulnerable interfaces.

🧯 If You Can't Patch

  • Isolate Avamar systems from untrusted networks using firewall rules
  • Implement web application firewall (WAF) rules to detect and block SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check Avamar version via administrative interface or CLI. If version is prior to 19.12 (and not 19.10/19.10SP1 with patch 338869), the system is vulnerable.

Check Version:

On Avamar server: avmgr version

Verify Fix Applied:

Verify patch installation through Avamar patch management interface or by checking version/patch level matches the fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in Avamar logs
  • Multiple failed authentication attempts followed by SQL errors
  • Unexpected database access from non-administrative accounts

Network Indicators:

  • SQL injection patterns in HTTP requests to Avamar management interfaces
  • Unusual outbound database connections from Avamar servers

SIEM Query:

source="avamar" AND ("sql" OR "injection" OR "syntax error")

🔗 References

📤 Share & Export