Skip to main content

CVE-2023-39248: CWE-400: Uncontrolled Resource Consumption in Dell Dell Networking OS10

High
VulnerabilityCVE-2023-39248cvecve-2023-39248cwe-400
Published: Tue Dec 05 2023 (12/05/2023, 06:04:01 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: Dell Networking OS10

Description

Dell OS10 Networking Switches running 10.5.2.x and above contain an Uncontrolled Resource Consumption (Denial of Service) vulnerability, when switches are configured with VLT and VRRP. A remote unauthenticated user can cause the network to be flooded leading to Denial of Service for actual network users. This is a high severity vulnerability as it allows an attacker to cause an outage of network. Dell recommends customers to upgrade at the earliest opportunity.

AI-Powered Analysis

AILast updated: 07/07/2025, 08:11:21 UTC

Technical Analysis

CVE-2023-39248 is a high-severity vulnerability identified in Dell Networking OS10, specifically affecting versions 10.5.2.x and above, including 10.5.5.5. The vulnerability is classified under CWE-400, which pertains to uncontrolled resource consumption leading to Denial of Service (DoS). This issue arises when Dell OS10 switches are configured with Virtual Link Trunking (VLT) and Virtual Router Redundancy Protocol (VRRP). An unauthenticated remote attacker can exploit this vulnerability to flood the network with excessive traffic, overwhelming the switch resources and causing a denial of service condition. The attack does not require any authentication or user interaction, making it easier to exploit remotely over the network. The CVSS v3.1 base score is 7.5, indicating a high severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning the attack can be launched remotely with low complexity, no privileges, no user interaction, and results in high impact on availability without affecting confidentiality or integrity. Although no known exploits are currently reported in the wild, the potential for network outages caused by this vulnerability is significant, especially in environments relying on VLT and VRRP configurations for network redundancy and high availability. Dell recommends upgrading affected systems at the earliest opportunity to mitigate this risk.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to network availability, particularly for enterprises, data centers, and service providers that utilize Dell Networking OS10 switches with VLT and VRRP configurations. A successful exploitation could lead to network outages, disrupting critical business operations, communications, and services. This is especially impactful for sectors such as finance, healthcare, telecommunications, and government, where network uptime is crucial. The denial of service could also affect cloud service providers and managed service providers operating in Europe, potentially cascading to multiple clients. Given the remote and unauthenticated nature of the exploit, attackers could launch attacks from outside the organization, increasing the threat surface. The lack of impact on confidentiality and integrity means data breaches are unlikely, but the disruption to availability alone can cause significant operational and financial damage, including regulatory compliance issues under frameworks like GDPR if services are interrupted.

Mitigation Recommendations

European organizations should prioritize upgrading Dell Networking OS10 switches to patched versions beyond 10.5.5.5 as soon as Dell releases a fix. Until patches are available, network administrators should consider the following mitigations: 1) Restrict network access to management interfaces and VLT/VRRP configurations using access control lists (ACLs) and segmentation to limit exposure to untrusted networks. 2) Monitor network traffic for unusual flooding patterns indicative of exploitation attempts, using intrusion detection/prevention systems (IDS/IPS) and network behavior anomaly detection tools. 3) Implement rate limiting and traffic shaping on interfaces involved in VLT and VRRP to reduce the impact of potential flooding. 4) Regularly audit and review switch configurations to ensure minimal exposure and adherence to security best practices. 5) Establish incident response plans specifically addressing network DoS scenarios to minimize downtime. 6) Engage with Dell support for early access to patches or workarounds and stay informed on updates related to this CVE.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2023-07-26T08:13:50.421Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68385089182aa0cae27baae7

Added to database: 5/29/2025, 12:18:17 PM

Last enriched: 7/7/2025, 8:11:21 AM

Last updated: 7/31/2025, 10:56:25 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats