CVE-2025-30103

5.5 MEDIUM

📋 TL;DR

Dell SmartFabric OS10 Software versions before 10.6.0.5 have a file permission vulnerability that allows low-privileged local users to access files or directories they shouldn't. This affects organizations using Dell networking equipment with OS10 software. Attackers could potentially read sensitive configuration files or system information.

💻 Affected Systems

Products:
  • Dell SmartFabric OS10 Software
Versions: All versions prior to 10.6.0.5
Operating Systems: Dell OS10
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Dell networking switches running OS10 software. Requires local access to the switch management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains access to sensitive configuration files, credentials, or system files, potentially enabling privilege escalation, network configuration manipulation, or lateral movement.

🟠

Likely Case

Local user accesses restricted files containing network configuration details, system logs, or other sensitive operational data.

🟢

If Mitigated

Minimal impact with proper access controls, monitoring, and network segmentation limiting attacker movement.

🌐 Internet-Facing: LOW - Requires local access to the switch management interface.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged local access. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.6.0.5 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000346195/dsa-2025-259-security-update-for-dell-networking-os10-vulnerabilities

Restart Required: Yes

Instructions:

1. Download OS10 version 10.6.0.5 or later from Dell support. 2. Backup current configuration. 3. Apply the update following Dell's upgrade procedures. 4. Reboot the switch. 5. Verify the new version is running.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and logical access to switch management interfaces to authorized personnel only.

Implement Access Controls

all

Use RBAC to minimize users with local access and implement least privilege principles.

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local access to switches
  • Monitor switch access logs for unauthorized local access attempts

🔍 How to Verify

Check if Vulnerable:

Check OS10 version using 'show version' command. If version is below 10.6.0.5, system is vulnerable.

Check Version:

show version

Verify Fix Applied:

After patching, run 'show version' to confirm version is 10.6.0.5 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Multiple failed access attempts to restricted directories
  • Unauthorized user accessing switch management interface

Network Indicators:

  • Unusual management interface access from unexpected sources

SIEM Query:

source="dell_os10" AND (event_type="file_access" OR event_type="auth_failure")

🔗 References

📤 Share & Export