Cyber Posture

CVE-2024-49559

High

Published: 17 March 2025

Published
17 March 2025
Modified
30 April 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-49559 is a high-severity Use of Default Password (CWE-1393) vulnerability in Dell Smartfabric Os10. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 40.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 explicitly requires changing default authenticators prior to first use, directly preventing exploitation of unchanged default passwords for unauthorized access.

prevent

AC-2 mandates changing default passwords for accounts and managing account privileges, mitigating unauthorized access via default credentials.

prevent

CM-6 enforces secure configuration settings that include eliminating default passwords, addressing the vulnerability through baseline configurations.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability is explicitly a Use of Default Password (CWE-1393) allowing remote unauthorized access with default credentials, which directly maps to the Default Accounts sub-technique under Valid Accounts for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Use of Default Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

Deeper analysisAI

CVE-2024-49559 is a Use of Default Password vulnerability (CWE-1393) affecting Dell SmartFabric OS10 Software in versions 10.5.4.x, 10.5.5.x, 10.5.6.x, and 10.6.0.x. This flaw allows unauthorized access due to the reliance on default credentials, earning a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.

A low-privileged attacker with remote access can exploit this vulnerability to gain unauthorized access to the affected system. The CVSS vector highlights that exploitation requires only low privileges and no user interaction, enabling the attacker to potentially compromise the full triad of CIA impacts at a high level.

Dell has published multiple security advisories addressing this and related OS10 vulnerabilities, including DSA-2025-070, DSA-2025-069, DSA-2025-079, and DSA-2025-068, available at the referenced KB articles. These updates detail patches and mitigation steps for affected versions.

Details

CWE(s)

Affected Products

dell
smartfabric os10
10.5.4.0 — 10.5.4.14 · 10.5.5.0 — 10.5.5.13 · 10.5.6.0 — 10.5.6.8

CVEs Like This One

CVE-2024-48830Same product: Dell Smartfabric Os10
CVE-2026-22284Same product: Dell Smartfabric Os10
CVE-2024-48013Same product: Dell Smartfabric Os10
CVE-2024-49561Same product: Dell Smartfabric Os10
CVE-2024-48831Same product: Dell Smartfabric Os10
CVE-2025-22472Same product: Dell Smartfabric Os10
CVE-2025-22473Same product: Dell Smartfabric Os10
CVE-2025-46427Same product: Dell Smartfabric Os10
CVE-2025-46428Same product: Dell Smartfabric Os10
CVE-2026-22273Same vendor: Dell

References