Dell fixes CVE-2024-37143 and CVE-2024-38144 vulnerabilities

Dell fixes CVE-2024-37143 and CVE-2024-38144 vulnerabilities


Dell has recently released security updates to address multiple vulnerabilities affecting several of its enterprise products, including PowerFlex, InsightIQ, and Data Lakehouse.

The vulnerabilities, identified as CVE-2024-37143 with a CVSS score of 10 and CVE-2024-37144 with a CVSS score of 8.2, pose significant risks, ranging from remote code execution to information disclosure.

Advertisements

Overview of the Vulnerabilities

CVE-2024-37143: Remote Code Execution

  • Description: This critical vulnerability allows an unauthenticated attacker with remote access to execute arbitrary code on the affected systems. The flaw arises from improper link resolution before file access, which can be exploited to gain control over the system.
  • Impact: With a maximum CVSS score of 10.0, this vulnerability poses a critical threat, enabling attackers to potentially take full control of the compromised systems.

Affected Products:

  • Dell PowerFlex appliance versions prior to IC 46.381.00 and IC 46.376.00
  • Dell PowerFlex rack versions prior to RCM 3.8.1.0 (for RCM 3.8.x train) and prior to RCM 3.7.6.0 (for RCM 3.7.x train)
  • Dell PowerFlex custom node using PowerFlex Manager versions prior to 4.6.1.0
  • Dell InsightIQ versions prior to 5.1.1
  • Dell Data Lakehouse versions prior to 1.2.0.0

CVE-2024-37144: Information Disclosure

  • Description: This vulnerability involves insecure storage of sensitive information, which can be exploited by a high-privileged attacker with local access. By gaining access to critical files, the attacker can exfiltrate sensitive data.
  • Impact: With a CVSS score of 8.2, this vulnerability allows for significant information disclosure, potentially compromising the security of sensitive data.

Affected Products:

  • Dell PowerFlex appliance versions prior to IC 46.381.00 and IC 46.376.00
  • Dell PowerFlex rack versions prior to RCM 3.8.1.0 (for RCM 3.8.x train) and prior to RCM 3.7.6.0 (for RCM 3.7.x train)
  • Dell PowerFlex custom node using PowerFlex Manager versions prior to 4.6.1.0
  • Dell InsightIQ versions prior to 5.1.1
  • Dell Data Lakehouse versions prior to 1.2.0.0
Advertisements

Response and Recommendations

Dell has released security updates for the affected products to address these vulnerabilities. Users are strongly advised to update their systems to the latest versions as soon as possible to mitigate the risks associated with these vulnerabilities. Additionally, organizations using any of the affected Dell products should prioritize applying the available patches to ensure the security of their systems.

Mitigation Steps

To protect against these vulnerabilities, Dell recommends the following actions:

  • Apply Security Patches: Immediately update to the latest versions of the affected products to ensure protection against these critical vulnerabilities.
  • Implement Robust Security Measures: Ensure that your systems have adequate security measures in place to prevent exploitation.
  • Conduct Regular Security Audits: Regularly review and audit your systems and applications to identify and mitigate potential vulnerabilities promptly.

By following these recommendations, organizations can significantly reduce the risk of exploitation and enhance the overall security of their IT infrastructure.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.