CVE-2024-48830
Published: 17 March 2025
Summary
CVE-2024-48830 is a high-severity Command Injection (CWE-77) vulnerability in Dell Smartfabric Os10. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Device CLI (T1059.008); ranked at the 45.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the command injection vulnerability by requiring timely identification, reporting, and application of vendor patches from Dell advisories.
Prevents command injection exploitation by enforcing validation and sanitization of inputs to neutralize special elements used in commands.
Limits the impact of arbitrary command execution by low-privileged local attackers through enforcement of least privilege principles.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability enables arbitrary command execution on a network device OS (T1059.008) and allows low-privileged local attackers to escalate privileges (T1068).
NVD Description
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.
Deeper analysisAI
CVE-2024-48830 is a command injection vulnerability (CWE-77: Improper Neutralization of Special Elements used in a Command) in Dell SmartFabric OS10 Software. The issue affects versions 10.5.4.x, 10.5.5.x, 10.5.6.x, and 10.6.0.x. It has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts from a local attack.
A low-privileged attacker with local access to the system can exploit this vulnerability to achieve arbitrary command execution. The low attack complexity and lack of user interaction requirements make it feasible for compromised low-privilege accounts to escalate control over the affected OS10 device.
Dell has published multiple security advisories addressing this and related OS10 vulnerabilities, including DSA-2025-070, DSA-2025-069, DSA-2025-079, and DSA-2025-068. These documents, available via Dell support KB articles, provide details on security updates and patches to mitigate the command injection risk. Security practitioners should review the advisories for version-specific remediation instructions.
Details
- CWE(s)