CVE-2024-49559
Published: 17 March 2025
Summary
CVE-2024-49559 is a high-severity Use of Default Password (CWE-1393) vulnerability in Dell Smartfabric Os10. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 40.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 explicitly requires changing default authenticators prior to first use, directly preventing exploitation of unchanged default passwords for unauthorized access.
AC-2 mandates changing default passwords for accounts and managing account privileges, mitigating unauthorized access via default credentials.
CM-6 enforces secure configuration settings that include eliminating default passwords, addressing the vulnerability through baseline configurations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is explicitly a Use of Default Password (CWE-1393) allowing remote unauthorized access with default credentials, which directly maps to the Default Accounts sub-technique under Valid Accounts for initial access.
NVD Description
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Use of Default Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.
Deeper analysisAI
CVE-2024-49559 is a Use of Default Password vulnerability (CWE-1393) affecting Dell SmartFabric OS10 Software in versions 10.5.4.x, 10.5.5.x, 10.5.6.x, and 10.6.0.x. This flaw allows unauthorized access due to the reliance on default credentials, earning a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
A low-privileged attacker with remote access can exploit this vulnerability to gain unauthorized access to the affected system. The CVSS vector highlights that exploitation requires only low privileges and no user interaction, enabling the attacker to potentially compromise the full triad of CIA impacts at a high level.
Dell has published multiple security advisories addressing this and related OS10 vulnerabilities, including DSA-2025-070, DSA-2025-069, DSA-2025-079, and DSA-2025-068, available at the referenced KB articles. These updates detail patches and mitigation steps for affected versions.
Details
- CWE(s)