Cyber Security News

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities

Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products.

These vulnerabilities pose significant risks to users, including potential data breaches and unauthorized access to sensitive information.

This article will delve into the details of these vulnerabilities, their impact, and the necessary steps users can take to protect themselves.

The Dell Secure Connect Gateway is a powerful tool designed to simplify connectivity and enhance security for enterprise environments.

It offers features such as proactive issue detection, predictive analysis, and secure two-way communication between Dell Technologies and customer environments.

However, despite its robust capabilities, the SCG has been found to contain several vulnerabilities that could compromise its security.

Identified Vulnerabilities

  1. CVE-2023-23695: This vulnerability involves a broken cryptographic algorithm in Dell Secure Connect Gateway versions 5.14.00.12 and 5.12.00.10. A remote unauthenticated attacker could exploit this vulnerability to perform man-in-the-middle (MitM) attacks, potentially obtaining sensitive information. The CVSS score for this vulnerability is 5.9, classified as medium severity.
  2. CVE-2025-26475: This vulnerability affects Dell Secure Connect Gateway SRS, version(s) 5.26. It involves an unvalidated Live-Restore setting, which could be exploited remotely. Although the CVSS score is not explicitly mentioned in the available data, the impact score is 3.7, indicating potential for data exposure.
  3. CVE-2024-47240 and CVE-2024-47241: These vulnerabilities were identified in Dell Secure Connect Gateway (SCG) 5.24. CVE-2024-47240 involves incorrect default permissions, allowing a local attacker with low privileges to access unauthorized data. CVE-2024-47241 is related to improper certificate validation, enabling unauthorized access to transmitted data. Both vulnerabilities have a CVSS score of 5.5.
  4. CVE-2024-48016: This vulnerability involves the use of a broken or risky cryptographic algorithm in Dell Secure Connect Gateway 5.0 Appliance – SRS, version(s) 5.24. It could lead to information disclosure and unauthorized system access. The CVSS score for this vulnerability is 4.6.
  5. CVE-2024-29168 and CVE-2024-29169: These are SQL injection vulnerabilities in Dell Secure Connect Gateway, with CVSS scores of 8.8 and 8.1, respectively, indicating high severity.

Impact and Recommendations

These vulnerabilities highlight the importance of keeping software up-to-date and ensuring that all security patches are applied promptly. Users of Dell Secure Connect Gateway should:

  • Update to the latest versions: Ensure that all SCG products are updated to the latest versions, such as version 5.26.00.18 or later, to mitigate known vulnerabilities.
  • Monitor for updates: Regularly check Dell’s support website for new security advisories and updates.
  • Implement additional security measures: Consider using additional security tools and practices, such as robust access controls and encryption, to enhance overall security posture.

Dell’s Secure Connect Gateway is a valuable tool for managing and securing enterprise environments, but like any complex software, it is not immune to vulnerabilities.

By staying informed about these vulnerabilities and taking proactive steps to update and secure their systems, users can significantly reduce the risk of exploitation and protect their sensitive data.

As technology continues to evolve, vigilance and prompt action will remain crucial in maintaining a secure digital landscape.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through seemingly…

52 minutes ago

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to a…

54 minutes ago

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane, which…

56 minutes ago

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North Korean…

58 minutes ago

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged…

4 hours ago

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser…

5 hours ago