• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Researchers Warn Of Superior Severity Dell Poweredge Server Flaw

Researchers Warn of Superior-Severity Dell PowerEdge Server Flaw

You are here: Home / Latest Cyber Security Vulnerabilities / Researchers Warn of Superior-Severity Dell PowerEdge Server Flaw
July 28, 2020

A path traversal vulnerability in the iDRAC technology can permit remote attackers to take around regulate of server functions.

Scientists have disclosed particulars of a a short while ago patched, higher-severity Dell PowerEdge server flaw, which if exploited could allow an attacker to thoroughly just take about and manage server functions.

The web vulnerability was observed in the Dell EMC iDRAC distant entry controller, technology embedded inside of the most recent variations of Dell PowerEdge servers. Although the vulnerability was set earlier in July, Georgy Kiguradze and Mark Ermolov, the scientists with Positive Systems who discovered the flaw, released a comprehensive examination, Tuesday.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The route traversal vulnerability (CVE-2020-5366), identified in Dell EMC iDRAC9 versions prior to 4.20.20.20, is rated as a 7.1 in phrases of exploitability, offering it a large-severity vulnerability ranking, according to an advisory published online by Dell.

Path traversal is 1 of the a few most frequent vulnerabilities researchers claimed that they arrive throughout in their investigations. If exploited, the flaw can enable attackers to see the articles of server folders that need to not be accessible even to somebody who’s logged in as an everyday site consumer. iDRAC operates on Linux, and the specific attractiveness to hackers in exploiting the vulnerability would be the means to study the file /and many others/passwd, which stores information and facts about Linux end users, the scientists reported.

An illustration of how this can be applied by attackers is a recent assault on two vulnerabilities uncovered on the Zoom movie conferencing app that could make it possible for distant attackers to breach the technique of any participant in a group phone. Indeed, a remote, authenticated malicious person with low privileges could possibly exploit the iDRAC flaw by manipulating enter parameters to acquire unauthorized examine obtain to the arbitrary files, Dell EMC warned in its advisory.

iDRAC is developed to allow IT administrators to remotely deploy, update, observe and retain Dell servers without having installing new software. Dell has previously unveiled an update to the iDRAC firmware that fixes the flaw and it recommends customers update as soon as achievable.

The vulnerability can only be exploited if iDRAC is linked to the internet, which Dell EMC does not advise, scientists explained. IDRAC also is a rather new technology in Dell EMC servers, which usually means it may not be widely used but.

Still, researchers claimed that public research engines presently identified several Internet-accessible connections to iDRAC that could be exploited, as well as 500 controllers accessible for accessibility employing SNMP.

The iDRAC controller is employed by network administrators to handle essential servers, “effectively functioning as a independent personal computer within the server by itself,” Kiguradze stated in a push statement.

“iDRAC runs on everyday Linux, though in a confined configuration, and has a completely-fledged file process,” he reported. “The vulnerability makes it doable to study any file in the controller’s running method, and in some instances, to interfere with procedure of the controller–for occasion through reading through symbolic Linux devices like /dev/urandom.”

Attackers can exploit the flaw externally by acquiring the back again-up of a privileged person or if they have credentials or brute-force their way in, Kiguradze said. They also could use the account of a junior administrator with confined server obtain to exploit the flaw internally, he said. When an attacker gains management, he or she can externally block or disrupt the server’s operation.

To improved secure Dell servers that use iDRAC, scientists encouraged that customers spot iDRAC on a individual administration network and really do not join the controller to the internet. Organizations also should really isolate the administration network or VLAN (this kind of as with a firewall) and restrict access to the subnet or VLAN to approved server administrators only.

Other tips by Dell EMC to secure iDRAC against intrusion involve utilizing 256-little bit encryption and TLS 1.2 or afterwards configuration selections these kinds of as IP address variety filtering and procedure lockdown manner and supplemental authentication these kinds of as Microsoft Lively Listing or LDAP.

Complimentary Threatpost Webinar: Want to find out far more about Private Computing and how it can supercharge your cloud security? This webinar “Cloud Security Audit: A Confidential Computing Roundtable” delivers best cloud-security professionals with each other to explore how Confidential Computing is a game changer for securing dynamic cloud data and blocking IP publicity. Be a part of us  Wednesday Aug. 12 at 2pm ET for this FREE live webinar.
Previous Post: «Cyber Security News Garmin Confirms Cyber-Assault as Ransomware Restoration Rumored
Next Post: No Additional Ransom Initiative Reflects on Achievements on Fourth Anniversary Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.