CVE-2025-22474

6.8 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Dell SmartFabric OS10 Software. A high-privileged attacker with remote access could exploit this to make the server send unauthorized requests to internal systems. Affected versions include 10.5.4.x, 10.5.5.x, 10.5.6.x, and 10.6.0.x.

💻 Affected Systems

Products:
  • Dell SmartFabric OS10 Software
Versions: 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x
Operating Systems: OS10
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high-privileged attacker with remote access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could pivot through the vulnerable system to access internal services, exfiltrate sensitive data, or perform internal network reconnaissance leading to further compromise.

🟠

Likely Case

Privileged attackers could abuse the vulnerable system to scan internal networks, access metadata services, or interact with internal APIs not intended for external access.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to the isolated network segment containing the vulnerable device.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires high-privileged access and specific conditions. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Dell advisories DSA-2025-070, DSA-2025-069, DSA-2025-079, DSA-2025-068 for specific fixed versions

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell security advisories DSA-2025-070, DSA-2025-069, DSA-2025-079, DSA-2025-068. 2. Identify the appropriate fixed version for your deployment. 3. Schedule maintenance window. 4. Backup configuration. 5. Apply the update following Dell's upgrade procedures. 6. Verify functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Dell SmartFabric OS10 systems from sensitive internal networks and restrict outbound connections.

Access Control Hardening

all

Implement strict access controls, limit administrative access, and use network ACLs to restrict management interfaces.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from sensitive internal resources
  • Enforce principle of least privilege for administrative access and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check OS10 software version using 'show version' command and compare against affected versions: 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x

Check Version:

show version

Verify Fix Applied:

After patching, verify the version is no longer in the affected range using 'show version' command

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connections from OS10 management interfaces
  • Multiple failed authentication attempts followed by successful login
  • Unexpected HTTP/HTTPS requests originating from OS10 systems

Network Indicators:

  • Unusual traffic patterns from OS10 systems to internal services
  • Requests to metadata services or internal APIs from OS10 management IPs

SIEM Query:

source="os10_logs" AND (http_request OR outbound_connection) AND dest_ip IN (internal_subnets)

🔗 References

📤 Share & Export