CVE-2025-22473
📋 TL;DR
This vulnerability allows a low-privileged attacker with local access to Dell SmartFabric OS10 switches to execute arbitrary code via command injection. It affects Dell SmartFabric OS10 Software versions 10.5.4.x, 10.5.5.x, 10.5.6.x, and 10.6.0.x. Exploitation could lead to full system compromise, including unauthorized access, data theft, or network disruption.
💻 Affected Systems
- Dell SmartFabric OS10 Software
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise: attacker gains root privileges, executes arbitrary commands, steals sensitive data, disrupts network operations, or pivots to other systems.
Likely Case
Local privilege escalation: attacker with low privileges gains higher-level access to the switch, potentially modifying configurations or accessing restricted data.
If Mitigated
Limited impact: with proper network segmentation, access controls, and monitoring, exploitation may be contained to the affected switch without spreading to other systems.
🎯 Exploit Status
Exploitation requires low-privileged local access and knowledge of command injection techniques; no public proof-of-concept is known as of the advisory date.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Dell advisories DSA-2025-070, DSA-2025-069, DSA-2025-079, DSA-2025-068 for specific patched versions.
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities
Restart Required: No
Instructions:
1. Review Dell advisories to identify the appropriate patch for your OS10 version. 2. Download the patch from Dell's support site. 3. Apply the patch following Dell's installation guidelines. 4. Verify the update by checking the OS version.
🔧 Temporary Workarounds
Restrict Local Access
allLimit local access to the switch to trusted users only, using strong authentication and access controls.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected switches from critical systems.
- Enhance monitoring and logging for suspicious command execution or privilege escalation attempts on the switch.
🔍 How to Verify
Check if Vulnerable:
Check the OS10 version on the switch; if it matches the affected versions (10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x), it is vulnerable.
Check Version:
show version
Verify Fix Applied:
After applying the patch, verify the OS10 version no longer falls within the affected ranges by checking the version command.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution logs, privilege escalation attempts, or unexpected system changes in OS10 logs.
Network Indicators:
- Anomalous network traffic from the switch, such as unexpected outbound connections or configuration changes.
SIEM Query:
Example: 'source="dell_os10" AND (event_type="command_injection" OR user_privilege_change="true")'
🔗 References
- https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities
- https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities