Wednesday, May 21, 2025
HomeCVE/vulnerabilityDell Security Update, Patch for Multiple Critical Vulnerabilities

Dell Security Update, Patch for Multiple Critical Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Dell Technologies has released a security advisory addressing multiple critical vulnerabilities that could expose affected systems to exploitation by malicious actors.

Customers are strongly encouraged to review the findings and update their systems accordingly.

This update includes remediation for two critical CVEs affecting several Dell products. Failure to address these vulnerabilities could result in system compromise, including unauthorized data access and remote code execution.

- Advertisement - Google News

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Dell Security Update

The vulnerabilities, if exploited, could allow attackers to execute arbitrary code remotely or gain unauthorized access to sensitive data stored on affected systems. This poses a significant risk to business continuity and data integrity.

CVE-2024-37143: Improper Link Resolution Before File Access

CVE-2024-37143 is a critical vulnerability identified as “Improper Link Resolution Before File Access,” affecting several Dell products including Dell PowerFlex appliances and racks, Dell InsightIQ, and Dell Data Lakehouse.

This vulnerability allows an unauthenticated attacker with remote access to exploit improper file link resolution mechanisms, potentially executing arbitrary code on the affected systems.

The vulnerability poses a severe threat due to its ease of exploitation and the high impact on the system’s confidentiality, integrity, and availability. It has been assigned a CVSS base score of 10.0, the highest possible, reflecting its critical nature

CVE-2024-37144: Insecure Storage of Sensitive Information

CVE-2024-37144 is a high-severity vulnerability classified as “Insecure Storage of Sensitive Information,” affecting multiple Dell products, such as Dell PowerFlex appliances, racks, and custom nodes, as well as Dell InsightIQ and Dell Data Lakehouse.

This vulnerability arises from improper handling of sensitive data, allowing a high-privileged attacker with local access to potentially disclose sensitive information.

Such exploitation could enable the attacker to gain unauthorized access to resources within the cluster, posing significant risks to system confidentiality and integrity. 

Dell strongly advises customers to evaluate the CVSS base scores and apply relevant updates promptly to mitigate risks.

Affected Products & Remediation

The following table outlines the affected products, versions, and the remediated versions available:

ProductSoftware/FirmwareAffected Versions
Dell PowerFlex applianceIntelligent Catalog (IC)Versions prior to 46.381.00
Dell PowerFlex applianceIntelligent Catalog (IC)Versions prior to 46.376.00
Dell PowerFlex rackRCM (3.8.x train)Versions prior to 3.8.1.0
Dell PowerFlex rackRCM (3.7.x train)Versions prior to 3.7.6.0
Dell PowerFlex custom nodePowerFlex ManagerVersions prior to 4.6.1.0
Dell InsightIQInstallation PackageVersions prior to 5.1.1
Dell Data LakehouseBundleVersions prior to 1.2.0.0

Dell Technologies assumes no liability for any damages arising from the utilization of this advisory. Customers are responsible for assessing the impact on their environment and applying updates as necessary.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known as PumpkinStealer in some...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...