CVE-2024-49561
Published: 17 March 2025
Summary
CVE-2024-49561 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Dell Smartfabric Os10. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 17.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces the principle of least privilege to ensure low-privileged local users cannot escalate privileges due to incorrect assignment in the OS10 software.
Requires identification, reporting, and correction of flaws like this incorrect privilege assignment vulnerability through timely patching as provided in Dell advisories.
Mandates management of accounts with minimal privileges necessary, reducing the attack surface for low-privileged local exploitation leading to elevation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a local privilege escalation vulnerability (CWE-266) allowing a low-privileged attacker to elevate privileges on the system, directly enabling T1068 Exploitation for Privilege Escalation.
NVD Description
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Deeper analysisAI
CVE-2024-49561 is an Incorrect Privilege Assignment vulnerability (CWE-266) in Dell SmartFabric OS10 Software, affecting versions 10.5.4.x, 10.5.5.x, 10.5.6.x, and 10.6.0.x. Published on 2025-03-17, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts from a local attack requiring low privileges and no user interaction.
A low-privileged attacker with local access could exploit this vulnerability to achieve elevation of privileges on the affected system.
Dell has issued multiple security advisories addressing this and related OS10 vulnerabilities, including DSA-2025-070 (https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities), DSA-2025-069 (https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities), DSA-2025-079 (https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities), and DSA-2025-068 (https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities). These provide security updates for mitigation.
Details
- CWE(s)