Dell Technologies has issued a critical security advisory warning customers about multiple vulnerabilities in its Secure Connect Gateway (SCG) product that could potentially lead to system compromise.
The vulnerabilities affect versions prior to 5.28.00.14 and require immediate attention from system administrators.
According to Dell’s advisory, two newly identified vulnerabilities specific to Dell’s proprietary code include:
This vulnerability (CVSS 4.7) allows high-privileged attackers with remote access to expose sensitive system information through improper access controls in the SCG’s SRS component.
Specifically affecting versions prior to 5.28.00.14, it enables unauthorized parties to access:
The attack surface is limited to authenticated users with elevated privileges, but successful exploitation could provide reconnaissance data for further attacks.
Risk Factors | Details |
Affected Products | Dell Secure Connect Gateway (SCG) 5.0 Appliance – SRS(Versions prior to 5.28.00.14) |
Impact | Sensitive system information |
Exploit Prerequisites | High-privileged attacker Remote access to SCG |
CVSS 3.1 Score | 4.7 |
Rated (CVSS 5.5), this flaw stems from improper validation of the container Live-Restore feature in SCG version 5.26. While designed to maintain container operations during daemon restarts, the implementation introduces:
Attackers could exploit this through phishing or UI redressing attacks to manipulate container persistence settings, potentially bypassing security measures during system updates.
Risk Factors | Details |
Affected Products | Dell Secure Connect Gateway (SCG) 5.0 Appliance – SRS(Versions prior to 5.28.00.14) |
Impact | Security control bypass |
Exploit Prerequisites | Low-privileged attacker, User interaction, Network access |
CVSS 3.1 Score | 5.5 |
These vulnerabilities represent significant security risks for organizations utilizing Dell Secure Connect Gateway in their infrastructure. It is strongly recommended for all customers to apply the available updates immediately.
Dell has released version 5.28.00.14 to address these vulnerabilities. Administrators are advised to:
For organizations unable to update immediately, Dell recommends monitoring systems for suspicious activity and implementing temporary mitigations where possible.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
The Federal Bureau of Investigation's Internet Crime Complaint Center (IC3) has revealed unprecedented financial damages…
ESET, a global leader in cybersecurity solutions, has announced a significant enhancement to its ESET…
The dark web has rapidly become a central hub for cybercriminal activity, where stolen data,…
A massive power outage struck the Iberian Peninsula on April 28, 2025, plunging millions of…
A sophisticated new red team tool called RedExt has recently been released, combining a Manifest…
Cybersecurity has rapidly evolved from a back-office technical concern to a boardroom imperative. As digital…