CVE-2025-22472

7.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Dell SmartFabric OS10 Software that allows low-privileged local attackers to execute arbitrary commands with elevated privileges. The vulnerability affects multiple versions of Dell's networking OS10 software. Attackers with local access to affected systems can potentially gain full control of the device.

💻 Affected Systems

Products:
  • Dell SmartFabric OS10 Software
Versions: 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x
Operating Systems: Dell OS10
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems running vulnerable OS10 versions regardless of configuration. Low privileged local access required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the networking device, allowing attacker to reconfigure network, intercept traffic, pivot to other systems, or deploy persistent backdoors.

🟠

Likely Case

Local privilege escalation leading to administrative control of the affected networking device, enabling network reconnaissance and lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to detect and contain local privilege escalation attempts.

🌐 Internet-Facing: LOW (requires local access, not remotely exploitable)
🏢 Internal Only: HIGH (low-privileged internal users or compromised accounts can exploit this to gain full device control)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low-privileged local access to the device. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates per Dell advisories DSA-2025-068, DSA-2025-069, DSA-2025-070, DSA-2025-079

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell advisories for specific patch versions. 2. Download appropriate firmware updates from Dell Support. 3. Apply updates following Dell's documented upgrade procedures. 4. Verify successful update and functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local console and SSH access to trusted administrative users only

configure terminal
username admin privilege 15 password <password>
line console 0
login local
line vty 0 15
login local
transport input ssh
access-class <acl-name> in

Implement Role-Based Access Control

all

Create separate low-privilege accounts with minimal necessary permissions

configure terminal
role name limited
rule 1 permit command show*
username operator role limited password <password>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Enable comprehensive logging and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check OS version with 'show version' command and compare against affected versions

Check Version:

show version | include Version

Verify Fix Applied:

Verify OS version after update and check that command injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Privilege escalation attempts
  • Multiple failed privilege elevation attempts followed by success

Network Indicators:

  • Unexpected configuration changes
  • Unusual outbound connections from networking devices
  • Changes to access control lists or routing tables

SIEM Query:

source="dell_os10" AND (event_type="command_execution" AND user!="admin") OR (event_type="privilege_change")

🔗 References

📤 Share & Export