CVE-2024-49565
Published: 28 March 2025
Summary
CVE-2024-49565 is a high-severity OS Command Injection (CWE-78) vulnerability in Dell Unity Operating Environment. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 41.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and patching of system flaws, directly addressing this OS command injection vulnerability via Dell's security update.
SI-10 implements input validation at system interfaces to detect and prevent invalid inputs, directly neutralizing special elements exploited in this OS command injection.
AC-6 enforces least privilege, restricting the scope of command execution and privilege escalation achievable by a low-privileged local attacker.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection vulnerability enables arbitrary command execution on a Linux-based system, directly facilitating T1068 for privilege escalation from low-privileged local access and T1059.004 for Unix shell command execution.
NVD Description
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation…
more
of privileges.
Deeper analysisAI
CVE-2024-49565 is an OS Command Injection vulnerability (CWE-78) affecting Dell Unity storage systems in versions 5.4 and prior. The flaw stems from improper neutralization of special elements used in an OS command, allowing malicious input to alter command execution.
A low-privileged attacker with local access can exploit this vulnerability with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Successful exploitation enables arbitrary command execution and privilege escalation, potentially granting full control over the affected system.
Dell has addressed this issue in DSA-2025-116, a security update for multiple vulnerabilities in Dell Unity, Dell UnityVSA, and Dell Unity XT, available via the provided advisory at https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities. Security practitioners should apply the patch promptly to mitigate risks.
Details
- CWE(s)