CVE-2025-22473

7.8 HIGH

📋 TL;DR

This vulnerability allows a low-privileged attacker with local access to Dell SmartFabric OS10 switches to execute arbitrary code via command injection. It affects Dell SmartFabric OS10 Software versions 10.5.4.x, 10.5.5.x, 10.5.6.x, and 10.6.0.x. Exploitation could lead to full system compromise, including unauthorized access, data theft, or network disruption.

💻 Affected Systems

Products:
  • Dell SmartFabric OS10 Software
Versions: 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x
Operating Systems: OS10
Default Config Vulnerable: ⚠️ Yes
Notes: Affects switches running the specified OS10 versions; vulnerability is present in default configurations and requires local access for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise: attacker gains root privileges, executes arbitrary commands, steals sensitive data, disrupts network operations, or pivots to other systems.

🟠

Likely Case

Local privilege escalation: attacker with low privileges gains higher-level access to the switch, potentially modifying configurations or accessing restricted data.

🟢

If Mitigated

Limited impact: with proper network segmentation, access controls, and monitoring, exploitation may be contained to the affected switch without spreading to other systems.

🌐 Internet-Facing: LOW with brief explanation: This vulnerability requires local access, making direct internet exploitation unlikely unless the switch is misconfigured for remote management without proper safeguards.
🏢 Internal Only: HIGH with brief explanation: High risk internally as attackers with local network access (e.g., via compromised credentials or insider threats) can exploit this to gain control of critical network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires low-privileged local access and knowledge of command injection techniques; no public proof-of-concept is known as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Dell advisories DSA-2025-070, DSA-2025-069, DSA-2025-079, DSA-2025-068 for specific patched versions.

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities

Restart Required: No

Instructions:

1. Review Dell advisories to identify the appropriate patch for your OS10 version. 2. Download the patch from Dell's support site. 3. Apply the patch following Dell's installation guidelines. 4. Verify the update by checking the OS version.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to the switch to trusted users only, using strong authentication and access controls.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected switches from critical systems.
  • Enhance monitoring and logging for suspicious command execution or privilege escalation attempts on the switch.

🔍 How to Verify

Check if Vulnerable:

Check the OS10 version on the switch; if it matches the affected versions (10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x), it is vulnerable.

Check Version:

show version

Verify Fix Applied:

After applying the patch, verify the OS10 version no longer falls within the affected ranges by checking the version command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution logs, privilege escalation attempts, or unexpected system changes in OS10 logs.

Network Indicators:

  • Anomalous network traffic from the switch, such as unexpected outbound connections or configuration changes.

SIEM Query:

Example: 'source="dell_os10" AND (event_type="command_injection" OR user_privilege_change="true")'

🔗 References

📤 Share & Export